TmuxRecon
Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the speed and convenience of Tmux. Great for OSCP/HTB type Machines as well as penetration testing.
Install / Use
/learn @CoolHandSquid/TmuxReconREADME
<h1 align="center">!!THIS PROJECT HAS MOVED!!</H1>
<p align="center">TmuxRecon has been integrated into <a href="https://github.com/CoolHandSquid/TireFire">TireFire</a>.</p>
<p align="center">This repository has been migrated and will no longer be updated or supported. Use TireFire in the future. Thank you for your support!</p>
<!--  -->
<p align="center"><a href="https://github.com/coolhandsquid/TireFire#tirefire"><img src="https://github.com/CoolHandSquid/TireFire/blob/TireFire_V3/Images/circle-cropped.png" height="60"/></a></p>
<!-- <p align="center"><a href="https://github.com/coolhandsquid/TireFire#tirefire"><img src="https://github.com/CoolHandSquid/TireFire/blob/TireFire_V3/Images/circle-cropped.png" height="60"/></a></p> -->
<h1 align="center">TmuxRecon</h1>
<p align="center">Automate the scanning and enumeration of machines while maintaining complete control over scans shot to targets. All the while applying the speed and convenience of tmux! Great for OSCP/HTB type Machines as well as penetration testing.</p>
<p align="center">"The Metasploit of External Enumeration"</p>
<p align="center">
<a><img src="https://img.shields.io/badge/price-FREE-0098f7.svg" height="20"/></a>
<a><img src="https://img.shields.io/github/license/mashape/apistatus.svg" height="20"/></a>
<a><img src="https://img.shields.io/badge/OS-Kali-yellow.svg" height="20"/></a>
<a><img src="https://img.shields.io/badge/python-3.7%2B-blue.svg" height="20"/></a>
<a><img src="https://img.shields.io/badge/version-1.0.2-lightgrey.svg" height="20"/></a>
<a href="https://twitter.com/intent/tweet?text=Automate%20the%20scanning%20and%20enumeration%20of%20machines%20while%20maintaining%20complete%20control%20over%20scans%20shot%20to%20targets.%20All%20the%20while%20applying%20the%20speed%20and%20convenience%20of%20tmux%21&url=https://github.com/CoolHandSquid/TmuxRecon&via=CoolHandSquid&hashtags=infosec,oscp,HackTheBox,kalilinux,pentesting"><img src="https://img.shields.io/twitter/url/http/shields.io.svg?style=social" alt="tweet" height="20"></a>
</p>
<p align="center"><img src="https://github.com/CoolHandSquid/TmuxRecon/blob/main/Images/TmuxRecon_InAction_4.png" /></p>
<!-- # TireFire





[](https://twitter.com/intent/tweet?text=If%20you%20want%20to%20automate%20scanning%20and%20enumeration%20machines%20externally%20while%20still%20maintaining%20full%20control%20over%20the%20commands%20sent%20to%20the%20target%2C%20TireFire%20is%20your%20tool%20of%20choice%21%20Great%20for%20OSCP%2FHTB%20type%20Machines%21&url=https://github.com/CoolHandSquid/TireFire&via=CoolHandSquid&hashtags=infosec,oscp,hacking) -->
Contents
About
- Think Metasploit, but for external enumeration...
- TmuxRecon is a scalable and straightforward platform to place your operational workflow.
- The database for TmuxRecon (Main.csv) is easily altered to support your methodologies as they are substituted and appended.
- Great for HTB and OSCP like machines.
- TmuxRecon is a product of 19% security solutions.
Demo

Kickoff
TmuxRecon 10.11.1.8
<!--
## HowTo
* Once Build.sh has been run, TmuxRecon will have been added to your path.
* From the "Main Table," type the corresponding number of a protocol for which you would like to run a scan.
* From the "Protocol Table," click the corresponding number of a scan you would like to run. The scan will be kicked off in another tab.
* Hit enter to return to the "Main Table."
* You can change the variables by going to the "Variables Table."
* If there is a scan or series of scans for a protocol, you would like to add, edit Main.csv following the guidelines in this README (it's pretty straight forward).
* Tables and commands can be added while TmuxRecon is running, and it will be populated once Main.csv is saved.
-->
Methodology
- Kickoff TmuxRecon (TmuxRecon 10.10.10.5).

- C-b w (Move into the TmuxRecon Session).

- When prompted, type "Y" to kickoff a Quick, Banner, All-Port, and UDP nmap scan.

- Notice that new windows were opened kicking off those scans. Depending upon the ports returned, run scans for those ports.

- Change variables as you need to suit your target (Example: HTTP running on port 8500).

ProTips
- Run multiple commands from a table at once by splitting the command numbers with commas. EX: 0,1,2 (Spaces and periods work aswell)
Build
git clone https://github.com/CoolHandSquid/TmuxRecon.git
cd TmuxRecon
./Build.sh
Adding Modules
- Open Main.csv with your favorite csv editor (I'm partial to ModernCSV and Excel).
- When adding a command, keep in mind Name, Port, and Description are for the primary display screen; Cmd_Name, Cmd_Description, Cmd_Command, Cmd_Comment, and SubDisplayOrder are for the secondary display screen.

Special Characters and Syntax
- Cmd_Command has a few special characters including &&&&, #, ##, ?, and {}.
&&&&
- &&&& Anywhere in the command will split the line and start each command individually in separate tabs.
- Example: whoami &&&& id &&&& ifconfig will open three tabs and run the desired command in each. &&&& is useful if you initially run multiple separate commands every time you see a specific port open.
# and ##
- "#" is for sending yourself notes to another tab.
- "#" can be useful if you don't want to run a command, but you want to give yourself copy-paste notes for manual enumeration.
- Set only the first character of the line to # if you want variables to be evaluated.
- Set the first two characters of the line to ## if you do not want variables to be evaluated.
?
- "?" is for sending a question to the user. The responce will be set to a numbered variable.
- You can send multiple lines of questions for multiple variables.
- Example:
?What is the location of the wp-login.php? Example: /Yeet/cannon/wp-login.php
?What is a known password you would like to brute force?
wpscan --url {Web_Proto}://{IP}{1} --enumerate u,tt,t,vp --password {2} -e
{}
- {} is for grabbing a variable from TmuxRecon.
- Available variables can be viewed in the variables table.
Supporters
Contact
Please contact me at CoolHandSquid32@gmail.com for contribution, suggestions, and ideas!
<p align="center"> <img src="https://github.com/CoolHandSquid/TmuxRecon/blob/main/Images/TireFireLogo1.png" width="200" /> </p> <p align="center"> <img src="https://github.com/CoolHandSquid/TmuxRecon/blob/main/Images/CoolHandSquid.jpg" width="200" /> </p> <p align="center"><a href="https://github.com/coolhandsquid/TmuxRecon#TmuxRecon"><img src="https://github.com/CoolHandSquid/TmuxRecon/blob/main/Images/backToTopButton.png" alt="Back to top" height="29"/></a></p>