SkillAgentSearch skills...

Malwaricon

Bash-based recon automation script that orchestrates tools like Nmap, Dirsearch (Python), and crt.sh to perform port scanning, directory enumeration, certificate parsing, and generate structured reports. Supports multiple domains, scan mode selection, interactive input, and cron scheduling for continuous monitoring.

Install / Use

/learn @mrlrch/Malwaricon
About this skill

Quality Score

0/100

Category

Operations

Supported Platforms

Universal

README

malwaricon.sh

malwaricon.sh is a Bash-based reconnaissance automation script created for security researchers and bug bounty hunters. It automates tasks such as port scanning, subdomain enumeration, directory brute-forcing, certificate parsing, and report generation.


Table of Contents


Features

  • Port scanning with Nmap
  • Subdomain enumeration via crt.sh
  • Directory brute-forcing using Dirsearch
  • Clean and structured output parsing using grep, jq, and shell scripting
  • Generates organized reports for each scanned domain
  • Interactive and automated execution modes
  • Modular support for external libraries (scan.lib)

Requirements

Before using malwaricon.sh, ensure the following tools are installed:

  • bash
  • nmap
  • python3
  • dirsearch
  • jq
  • curl
  • git (optional, for versioning reports)

Set the PATH_TO_DIRSEARCH variable in the script if dirsearch.py is not in your $PATH.


Installation

Clone the repository and make the script executable:

git clone https://github.com/mrlrch/malwaricon.git
cd malwaricon
chmod +x malwaricon.sh scan.lib

Usage

Basic Scan

./malwaricon.sh example.com

Specific Module Execution

./malwaricon.sh example.com nmap-only
./malwaricon.sh example.com dirsearch-only
./malwaricon.sh example.com crt-only

Multiple Domains

./malwaricon.sh -m dirsearch-only example.com test.com

Interactive Mode

./malwaricon.sh -i -m dirsearch-only

Type quit to stop scanning.


Output

Results are stored in a directory named after the scanned domain:

example.com_recon/
├── crt/
├── dirsearch/
├── nmap/
└── report

The report file includes a summary of all actions and findings.


Scheduled Scans (Cron)

To schedule automated scans (e.g., daily at 21:30):

30 21 * * * /path/to/malwaricon.sh example.com
40 21 * * * git -C /path/to/output add . && git -C /path/to/output commit -m "daily scan" && git -C /path/to/output push

License

This project is licensed under the MIT License. Originally authored by MIT and adapted by Malwarilia.


Disclaimer

This tool is intended for ethical hacking, cybersecurity research, and Bug Bounty recon phases. Use it only on systems you own or have explicit permission to test. Unauthorized use may violate laws and ethical standards.


Contact

View on GitHub
GitHub Stars15
CategoryOperations
Updated1mo ago
Forks1

Languages

Shell

Security Score

75/100

Audited on Feb 19, 2026

No findings