Published on July 18, 2025 by Ronit Paikray
Are you a security researcher or penetration tester looking for a powerful, automated tool to streamline your web reconnaissance? Meet WaveRecon, a cross-platform Python tool I created to simplify URL discovery, subdomain enumeration, and vulnerability scanning. With advanced features like CVE lookup, API integrations, and customizable reports, WaveRecon empowers you to uncover vulnerabilities efficiently. Let’s dive into what makes WaveRecon a must-have in your security toolkit!
Why WaveRecon?
WaveRecon is designed to automate and enhance web security assessments. Whether you're testing a single domain or a list of targets, this tool combines ease of use with robust functionality. Here’s what sets it apart:
-
Comprehensive URL Collection: Gathers URLs using tools like
gau
,waybackurls
,katana
,ParamSpider
, and more for thorough discovery. - Vulnerability Scanning: Leverages Nuclei for fast, customizable vulnerability detection.
-
Subdomain Enumeration: Finds subdomains with
subfinder
to expand your attack surface. - Customizable Scanning: Supports rate limits, concurrency, proxies, custom User-Agents, and HTTP headers.
- Rich Reporting: Generates HTML, JSON, CSV, and PDF reports with OWASP and CVE references.
-
Interactive UI: Features countdown timers and progress bars using
rich
for a modern experience. - Vulnerability Intelligence: Includes NVD API-based CVE lookup and exploit payloads for XSS, SSRF, and SQLi.
- API Integrations: Queries VirusTotal, Shodan, and Censys for enriched domain insights.
- Notifications: Sends scan updates via Slack, Discord, or Telegram.
- Continuous Scanning & Plugins: Supports scheduled scans and custom scripts for extensibility.
Getting Started with WaveRecon
Setting up WaveRecon is a breeze with its automated setup.py
script. Here’s how to get started:
Prerequisites
- Python 3.8+
- Go 1.18+
- Git
- LaTeX (for PDF reports)
- Optional: API keys for VirusTotal, Shodan, Censys, and Telegram
Installation
- Clone the repository:
git clone https://github.com/Ronit-paikray/WaveRecon.git
cd WaveRecon
- Run the setup script:
python3 setup.py
This installs tools (nuclei
, subfinder
, katana
, etc.), Python libraries (requests
, rich
, schedule
, reportlab
), and sets up the project directory with a sample domains.txt
.
Usage
Run a scan with a single command:
python3 waverecon.py -d example.com --subdomains --json --csv --pdf --telegram "bot_token:chat_id"
This scans example.com
, enumerates subdomains, and generates JSON, CSV, and PDF reports, with Telegram notifications.
Explore more options:
-
--proxy http://proxy:8080
: Scan through a proxy. -
--virustotal-api vt_key
: Enrich results with VirusTotal data. -
--continuous daily
: Schedule daily scans.
Check the GitHub README for all command-line options.
Why Choose WaveRecon?
WaveRecon stands out for its automation, extensibility, and user-friendly interface. The setup.py
script makes installation seamless, while features like session persistence, deduplication, and API integrations save time and enhance results. Whether you're a beginner or a seasoned pentester, WaveRecon simplifies complex reconnaissance tasks.
Join the Community
WaveRecon is open-source and welcomes contributions! Fork the repository, add features, or report issues on GitHub. Your feedback helps make WaveRecon better.
Try WaveRecon Today!
Ready to supercharge your web security testing? Clone WaveRecon now and explore its powerful features. Share your experience in the comments or connect with me on GitHub or via email at ronitpaikray6@gmail.com.
Happy hacking, and stay secure!
Keywords: web reconnaissance, vulnerability scanning, penetration testing, security tools, WaveRecon, subdomain enumeration, CVE lookup, API integration, Python
Top comments (0)