Recon-ng v4.9.3 - a full featured Web Reconnaissance framework.

Recon-ng v4.9.3 – a full featured Web Reconnaissance framework.

Changelog Recon-Ng v4.9.3:
+ Added the “count” parameter to the API call in the twitter module.
+ Fixed a bug in the ssl_san module.
+ Removed the linkedin_auth module due to API restrictions that rendered the module useless.
+ Updated the search_bing_api method URL for the current version of the API.
+ Added an error condition check to the certificate_transparency module.
+ Removed the instagram pushpin module due to API restrictions that rendered the module useless.
+ Added a delay to the search_shodan_api method to account for API rate limiting. Also fixed a typo in the shodan_ip module.
+ Added an error condition check to the hackertarget module.
+ added the hibp_password module.
+ Updated the resolver mixin to initialize a clean resolver.
+ Updated the authentication process for the fullcontact module.
+ Updated the hashes_org module to use v2 of its API.

Recon-Ng v4.9.3

Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly and thoroughly.

Recon-ng has a look and feel similar to the Metasploit Framework, reducing the learning curve for leveraging the framework. However, it is quite different. Recon-ng is not intended to compete with existing frameworks, as it is designed exclusively for web-based open source reconnaissance.

Recon-ng is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Each module is a subclass of the “module” class. The “module” class is a customized “cmd” interpreter equipped with built-in functionality that provides simple interfaces to common tasks such as standardizing output, interacting with the database, making web requests, and managing API keys.

Usage:

Source: https://bitbucket.org/LaNMaSteR53 | Our Post Before