Skip to content
This repository has been archived by the owner on Oct 10, 2023. It is now read-only.
/ recon.cloud Public archive

recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to terminal.

License

Notifications You must be signed in to change notification settings

Devang-Solanki/recon.cloud

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 

Repository files navigation

recon.cloud

InstallationUsageTodoContribute

recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to terminal.


⚠️ NOTE: This tool will not work anymore because of cloudflare bot protection. Wait for some months till recon.cloud develope a proper API for us to use.

subfinder

⚙ Installation

recon.cloud requires go1.19 to install successfully. Run the following command to get the repo -

go install github.com/Devang-Solanki/recon.cloud@latest

or you can download the pre-built binary from releases page

📔 Usage

recon.cloud -h will print help menu

❯ recon.cloud -h
Usage of ./recon.cloud:
  -d string
        Only Domain
  -l string
        List of file containing Domains
  -o string
        Path of output file (default "none")
  -only-ip
        Get IPs instead of Domains

You can pass single domain with flag -d

❯ recon.cloud -d wikipedia.com
wikipediademo.userlane.com.s3.amazonaws.com
wikipedia.s3.amazonaws.com
wikipedia-links.s3.amazonaws.com
wikipedia-test-data.s3.amazonaws.com
wikipedia.austinshaf.org.s3-website-us-east-1.amazonaws.com

You can also pass domain via stdin

echo "hackerone.com" | recon.cloud 
resources.hackerone.com
test-hackerone-vpn-service.s3.amazonaws.com
git.hackerone-us-west-2-production-attachments.s3.amazonaws.com
hackerone-vpn-service.s3.amazonaws.com
gslink.hackerone.com

❯ cat targets.txt | recon.cloud

With -only-ip you can get IP

echo "hackerone.com" | recon.cloud -only-ip
3.98.63.202
52.60.160.16
52.60.165.183
52.218.209.82
52.92.181.81
52.218.235.67
52.92.128.209
52.92.209.49
52.84.125.62
52.84.125.13
52.84.125.129
52.84.125.74

With -l flag you can pass a list of files containing domains

recon.cloud -l targets.txt

With -o flag you can save output to a file

recon.cloud -d hackerone.com -o result.txt

🤝🏻 How to contribute:

If you want to contribute to this project then:

  • Submitting an issue because you have found a bug or you have any suggestion or request.

💡 TODO

☑️ Implemented everything in GO.

  • Using multiple threads for better speed
  • Option for output in different format eg: JSON, CSV etc
  • Option for filtering based on resources like s3, ec2 etc

Buy Me A Coffee

About

recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to terminal.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages