Exrecon
ExRecon – An advanced, TOR-routed Nmap automation framework for Kali Linux. Supports modular multi-scan recon, firewall evasion, Nikto web audits, and human-readable reporting with delta analysis. Built for stealth and operational security in red teaming, pen testing, and OSINT workflows.
Install / Use
/learn @ExRecon/ExreconREADME
🛡️ ExRecon - Ultimate TOR Nmap Automation
ExRecon is a stealth-oriented reconnaissance and scanning utility designed for Kali Linux. It automates advanced Nmap scans over the TOR network, validates anonymity, logs results in clean summaries, and allows optional log viewing — all while supporting multiple recon modes.
⚙️ Features
| Capability | Description | |----------------------|-----------------------------------------------------------------------------| | TOR integration | Routes all scans through TOR using proxychains4, and rotates exit nodes | | Auto dependency check | Detects and installs required tools like Nmap, Nikto, TOR, enscript, and more | | Modular scans | User selects multiple scan types simultaneously | | Service detection | Uses Nmap scripts and custom UA strings to detect services behind firewalls | | Firewall evasion | Spoofs MAC address, modifies TTL, and optionally uses decoys | | Nikto web audit | Launches Nikto after detecting HTTP/HTTPS ports | | Live result viewer| Lets the user preview results using bat, less, or xdg-open | | Formatted reporting| Generates .txt and .pdf scan summaries with deltas vs previous scan | | Version-aware decoys| Uses --decoy only if supported by the installed Nmap version |
🛠️ Dependencies
ExRecon automatically checks and installs the following:
nmapproxychains4torcurlgpgtmuxnetcat-openbsdopensslenscriptghostscriptpandocnikto
🔧 Installation
chmod +x exrecon.sh
./exrecon.sh
On first run, ExRecon will:
- Ensure all required tools are installed
- Patch
/etc/tor/torrcto allow TOR control viaControlPort - Rotate TOR circuits before each scan
- Create log storage directory
~/tor_scan_logs
🚀 Usage
./exrecon.sh
- Enter target domain or IP when prompted
- Select one or more scan modes (comma-separated)
- Wait for scan to finish and optionally view results
📁 Output Directory
~/tor_scan_logs/
- Raw scan logs:
scan_<timestamp>.* - Summary Report:
scan_summary_<timestamp>.txt - Printable PDF:
scan_summary_<timestamp>.pdf - Anomaly comparison:
scan_summary_<timestamp>.delta
🔐 Notes
- 🔑 Run as root for full feature access (SYN scans, MAC spoofing)
- 🚦 TOR is validated before every scan; circuit is rotated
- 🌐 All traffic is routed via TOR using ProxyChains
- 🧹 Self-destruct functionality has been disabled in this version for report preservation
⚠️ Legal Warning
ExRecon is intended strictly for educational and authorized penetration testing purposes.
⚠️ Do not use this tool against systems/networks you do not own or lack explicit written permission to test. Misuse can result in criminal charges.
📜 License
MIT License — see LICENSE file for details.
🧠 Author
ExRecon developed by ExRecon as part of Offensive Security tooling — for the Greater Good. ❤️🔥
"Master Kali Linux, Excel in Offensive Security"
Related Skills
node-connect
340.5kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
84.2kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
340.5kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
commit-push-pr
84.2kCommit, push, and open a PR
