josh1643/totalrecon

A lightweight Python tool for passive reconnaissance, including subdomain, email, and S3 bucket extraction, with AI-powered scanner for sensitive infrastructure mentions.

30
/ 100
Emerging

This tool helps cybersecurity professionals quickly find critical information hidden within text and PDF documents during passive reconnaissance. It takes in various files and outputs extracted subdomains, email addresses, and AWS S3 bucket names, along with AI-generated summaries of potentially sensitive infrastructure mentions. This is ideal for red teamers, bug bounty hunters, CTF players, and cyber analysts.

No commits in the last 6 months. Available on PyPI.

Use this if you need to rapidly scan text or PDF files for cyber intelligence like exposed subdomains, emails, and S3 buckets, and want AI assistance in summarizing key findings.

Not ideal if you require 100% guaranteed accuracy without human review, as the AI component may occasionally produce inaccuracies.

cybersecurity red-teaming bug-bounty threat-intelligence digital-forensics
Stale 6m
Maintenance 2 / 25
Adoption 4 / 25
Maturity 24 / 25
Community 0 / 25

How are scores calculated?

Stars

8

Forks

Language

Python

License

MIT

Last pushed

Apr 27, 2025

Commits (30d)

0

Dependencies

4

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/josh1643/totalrecon"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.