Skip to content
/ s1c0n Public

simple recon tool to help you for searching vulnerability on web server

License

Notifications You must be signed in to change notification settings

x0rr-dan/s1c0n

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 
 
 
 
 

Repository files navigation

s1c0n

Python License

Terkey



	         ┏━┓╺┓ ┏━╸┏━┓┏┓╻
	         ┗━┓ ┃ ┃  ┃┃┃┃┗┫
	         ┗━┛╺┻╸┗━╸┗━┛╹ ╹ v1.7
                
                    Simple Recon
          Coded by root@x-krypt0n-x A.K.A x0r
	https://github.com/root-x-krypt0n-x/s1c0n]
	         System of Pekalongan

	  [?] Usage example: sicon -u target.com

last update:

so far no errors, testing on arch linux 2024.07.01

About:

simple recon tool to help you searching vulnerability on web server. maybe xD

Features:

  1. Auto scan WAF
  2. Auto scan port
  3. Auto scan subdomain
  4. Auto scan dir on web server
  5. Auto detect cms (only wordpress and joomla, i will add another cms if i have time to update this tool :) )
  6. Auto detect technology (like the server are use, framework, javascript framework, etc. thanks to builtwith librarry :) )

Tested on:

  • Othros linux
  • Kali Linux
  • Debian Linux
  • Parrot Linux
  • Arch Linux

tools that must be installed:

well this tool have function to auto install if some tools is not installed, so just run it with sudo if u using debian based

nmap
wafw00f
sublist3r
subfinder
assetfinder
dirsearch
httprobe

How to install:

pip3 install -r requirements.txt

How to use:

python3 sicon.py -u <target>

fakme

Screenshot from 2024-07-14 21-27-04

note

So far I have tried to eliminate the error output from the webserver which is offline when detecting the technology used, the error comes from the builtwith library which requires urllib, and I don't know how to eliminate the error, if you find a way please pull request to contribute :)