gorecon - Go-Based Web Recon Scanner
gorecon is a lightweight, fast, and extensible web reconnaissance tool built in Go. It performs network and HTTP probing on target domains to assist with security testing, bug bounty hunting, and red team recon.
π Features
- π Port probing on common web service ports (80, 443, 8080, etc.)
- π DNS CNAME lookup for subdomain analysis
- π§ Foundation for subdomain takeover detection (coming soon)
- β‘ Highly concurrent and fast (future enhancement)
- π JSON output (planned)
- π§ Easily extendable with additional scanning modules
π§° Technologies Used
| Task | Go Package |
|---|---|
| HTTP requests | net/http |
| Port scanning | net.DialTimeout |
| DNS lookups | net.LookupCNAME |
| CLI flags | flag |
| Concurrency | Goroutines and Channels (planned) |
π Getting Started
Prerequisites
- Go 1.20+ installed
Clone and Build
git clone https://github.com/iamritikbhardwaj/gorecon.git
cd gorecon
go build -o gorecon main.go
Usage
Create a text file with target domains or IP addresses, one per line. For example:
example.com
google.com
unclaimed.github.io
Run gorecon:
./gorecon -targets domains.txt
Sample output:
[DNS] example.com -> CNAME: example.com.
[PORT SCAN] Scanning example.com...
[OPEN] example.com:80
[OPEN] example.com:443
βοΈ CLI Flags
| Flag | Description | Default |
|---|---|---|
-targets |
Path to file with target domains/IPs | Required |
-timeout |
Timeout for network requests (seconds) | 5 |
-v |
Enable verbose logging | false |
π Future Roadmap
- β DNS CNAME Lookup
- β Port scanning on common web ports
- π² Concurrency for faster scans
- π² HTTP status and header enumeration
- π² Subdomain takeover detection
- π² Directory brute forcing with wordlists
- π² JSON output and report generation
- π² Webhooks and dashboard integration
π License
MIT License
βοΈ Author
Ritik Singh β Go enthusiast and security engineer in training
π GitHub: @iamritikbhardwaj
Top comments (0)