DEV Community

Ronit Paikray
Ronit Paikray

Posted on

Discover WaveRecon: Your Ultimate Web Reconnaissance Tool for Security Testing

Published on July 18, 2025 by Ronit Paikray

Are you a security researcher or penetration tester looking for a powerful, automated tool to streamline your web reconnaissance? Meet WaveRecon, a cross-platform Python tool I created to simplify URL discovery, subdomain enumeration, and vulnerability scanning. With advanced features like CVE lookup, API integrations, and customizable reports, WaveRecon empowers you to uncover vulnerabilities efficiently. Let’s dive into what makes WaveRecon a must-have in your security toolkit!

Why WaveRecon?

WaveRecon is designed to automate and enhance web security assessments. Whether you're testing a single domain or a list of targets, this tool combines ease of use with robust functionality. Here’s what sets it apart:

  • Comprehensive URL Collection: Gathers URLs using tools like gau, waybackurls, katana, ParamSpider, and more for thorough discovery.
  • Vulnerability Scanning: Leverages Nuclei for fast, customizable vulnerability detection.
  • Subdomain Enumeration: Finds subdomains with subfinder to expand your attack surface.
  • Customizable Scanning: Supports rate limits, concurrency, proxies, custom User-Agents, and HTTP headers.
  • Rich Reporting: Generates HTML, JSON, CSV, and PDF reports with OWASP and CVE references.
  • Interactive UI: Features countdown timers and progress bars using rich for a modern experience.
  • Vulnerability Intelligence: Includes NVD API-based CVE lookup and exploit payloads for XSS, SSRF, and SQLi.
  • API Integrations: Queries VirusTotal, Shodan, and Censys for enriched domain insights.
  • Notifications: Sends scan updates via Slack, Discord, or Telegram.
  • Continuous Scanning & Plugins: Supports scheduled scans and custom scripts for extensibility.

Getting Started with WaveRecon

Setting up WaveRecon is a breeze with its automated setup.py script. Here’s how to get started:

Prerequisites

  • Python 3.8+
  • Go 1.18+
  • Git
  • LaTeX (for PDF reports)
  • Optional: API keys for VirusTotal, Shodan, Censys, and Telegram

Installation

  1. Clone the repository:
   git clone https://github.com/Ronit-paikray/WaveRecon.git
   cd WaveRecon
Enter fullscreen mode Exit fullscreen mode
  1. Run the setup script:
   python3 setup.py
Enter fullscreen mode Exit fullscreen mode

This installs tools (nuclei, subfinder, katana, etc.), Python libraries (requests, rich, schedule, reportlab), and sets up the project directory with a sample domains.txt.

  1. (Windows only) Install MiKTeX or TeX Live for PDF reports.

Usage

Run a scan with a single command:

python3 waverecon.py -d example.com --subdomains --json --csv --pdf --telegram "bot_token:chat_id"
Enter fullscreen mode Exit fullscreen mode

This scans example.com, enumerates subdomains, and generates JSON, CSV, and PDF reports, with Telegram notifications.

Explore more options:

  • --proxy http://proxy:8080: Scan through a proxy.
  • --virustotal-api vt_key: Enrich results with VirusTotal data.
  • --continuous daily: Schedule daily scans.

Check the GitHub README for all command-line options.

Why Choose WaveRecon?

WaveRecon stands out for its automation, extensibility, and user-friendly interface. The setup.py script makes installation seamless, while features like session persistence, deduplication, and API integrations save time and enhance results. Whether you're a beginner or a seasoned pentester, WaveRecon simplifies complex reconnaissance tasks.

Join the Community

WaveRecon is open-source and welcomes contributions! Fork the repository, add features, or report issues on GitHub. Your feedback helps make WaveRecon better.

Try WaveRecon Today!

Ready to supercharge your web security testing? Clone WaveRecon now and explore its powerful features. Share your experience in the comments or connect with me on GitHub or via email at ronitpaikray6@gmail.com.

Happy hacking, and stay secure!

Keywords: web reconnaissance, vulnerability scanning, penetration testing, security tools, WaveRecon, subdomain enumeration, CVE lookup, API integration, Python

Top comments (0)