NetReconX

Advanced Network Reconnaissance Tool

A comprehensive Bash-based network scanning and security assessment toolkit for cybersecurity professionals

Terminal
$ ./NetReconX.sh
[*] Created by : made.dis
Initializing scan parameters...
Scanning local subnet...

Key Features

NetReconX provides a comprehensive suite of network scanning and security assessment tools

Multi-stage Network Scanning

Progressive scanning from basic discovery to advanced exploitation techniques

Service Enumeration

Detailed service identification and version detection

Vulnerability Assessment

Identify security weaknesses in target systems

Automated Tool Execution

Tools are executed based on discovered services and ports

Detailed Logging

Comprehensive output of scan results for analysis

Interactive CLI

User-friendly interface with colorful, animated outputs

Task Postponement

Schedule scans to run later or pause for manual execution

Extensible Architecture

Easily integrate new tools into the framework

Installation

Get started with NetReconX in just a few steps

1

Clone the Repository

git clone https://github.com/madedis/NetReconX.git
cd NetReconX
2

Make the Script Executable

chmod +x NetReconX.sh
3

Create Configuration File

touch config.cfg
4

Install Dependencies

sudo apt-get update
sudo apt-get install nmap curl hydra smbclient enum4linux
5

Run NetReconX

./NetReconX.sh

System Requirements

  • Bash 4.0+
  • Nmap
  • Standard Unix utilities
  • Root/sudo privileges (for some scans)

Documentation

Learn how to use and extend NetReconX

  • Usage Guide
  • Available Tools
  • Developer Guide
  • Configuration

Basic Usage

NetReconX can be run with various options to control scanning behavior:

# Basic scan
./NetReconX.sh

# Run with specific stage and target
./NetReconX.sh <stage> <target>

# Run postponed tools
./NetReconX.sh --run-postponed

Scanning Stages

NetReconX uses a multi-stage approach to scanning:

Stage Purpose Description
0 Initial Discovery Host discovery, basic port scanning, service detection
1 Service Enumeration Detailed service version detection, OS fingerprinting, script scanning
2-3 Advanced Testing Vulnerability assessment, brute force testing, service-specific scanning

Integrated Tools

NetReconX incorporates various security assessment tools:

Network Scanning

  • Nmap - Host discovery, port scanning, service detection
  • Various Nmap Techniques - SYN, TCP, UDP scanning

Web Assessment

  • Web Scanners - URL fetching, HTML analysis
  • Droopescan - Drupal vulnerability scanning

Authentication Testing

  • SMB Tools - smbmap, smbclient, enum4linux
  • RDP Testing - xfreerdp
  • Kerberos - kinit authentication
  • Evil-WinRM - Windows Remote Management

Service-Specific

  • rpcclient - SMB/RPC enumeration
  • mysql - MySQL database connections
  • ssh - SSH authentication

Adding New Tools

Extend NetReconX with your own tools by following these steps:

# 1. Add a new case statement in the tooler() function:
your_new_tool_name)
    echo "Running your new tool..."
    
    # Tool implementation here
    output_file="$OUTPUT_DIR/your_tool_output.txt"
    your_tool_command "$target" > "$output_file"
    
    # Wait for completion and cleanup
    wait $!
    echo "Completed"
    
    # Remove from postponed list if applicable
    if [[ -n "${POSTPONED_TOOLS[$tool]}" ]]; then
        unset "POSTPONED_TOOLS[$tool]"
        unset "TOOL_STATUS[$tool]"
        save_postponed_state
    fi
    ;;

# 2. For service-based tools, add them to the DEPLOYED_TOOL_AGENT array:
DEPLOYED_TOOL_AGENT=(
    ["your_tool"]="TOOL_ID"
    # Existing tools...
)

# 3. Map the tool to specific services in the DEMARCHE array:
DEMARCHE=(
    ["service_name"]="your_tool,other_tools"
    # Existing mappings...
)

Adding New Scanning Stages

Create custom scanning stages for specialized scans:

# 1. Create a new stage array:
STAGE_X=(
    ["option1"]="${SOME_OPTION}"
    ["option2"]="${ANOTHER_OPTION}"
)

# 2. Add the stage to the case statement in the tooler function:
case $stage in
    X)
        log "Starting Stage X scan."
        for option_group in "${!STAGE_X[@]}"; do
            option="${STAGE_X[$option_group]}"
            scan_options+="$option "
        done
        ;;
    # Existing stages...
esac

Configuration File

Customize NetReconX by creating a config.cfg file with these settings:

# Network settings
DEFAULT_TARGET="192.168.1.1"
DEFAULT_TIMEOUT=5

# Tool paths (if not in PATH)
NMAP_PATH="/usr/bin/nmap"
CUSTOM_TOOL_PATH="/path/to/custom/tool"

# Output settings
OUTPUT_DIR="./custom_output_dir"
DEBUG_MODE=true

Output Structure

NetReconX organizes results in the following locations:

  • ./output_dir/
    • tool1_output.txt
    • tool2_output.txt
    • ...
  • ./dumped_html/
    • target1.html
    • target2.html
    • ...
  • netreconx.log
  • postponed_tools.state

Download

Get NetReconX and start scanning today

GitHub Repository

Clone or download the latest version from GitHub

View on GitHub

Direct Download

Download the latest release as a zip file

Download ZIP

Current Version

v1.0.0

License

MIT License

Last Updated

April 27, 2025

About the Developer

Meet the cybersecurity expert behind NetReconX

0rc1nus

Product Strategy Maven with a Knack for Cybersecurity | Ready to Tackle Red Team & Blue Team Missions!

Who am I?

Every day presents a new opportunity to contribute to a world that is more innovative, impactful, and compassionate. I'm an eternal optimist who sees challenges as stepping stones to success. No goal is too ambitious, no problem without a solution—creativity, perseverance, and vision can turn even the boldest dreams into reality.

My passion lies in transforming ideas into powerful, tangible experiences that resonate on a global scale. I believe obstacles are simply hidden opportunities, and I'm always eager to explore the next breakthrough that could redefine how people engage with the world.

My Journey: Where Tech Meets Business Grit

I grew up in a world where "Computer science" was dinner-table conversation. By age 10, I was tinkering with a family laptop (circa 2000!), watching my brothers dive into hacking and network security. Fast-forward to my late twenties: I've spent 5+ years studying economics and marketing, dropped out of business school, and built RCG Consulting—a digital problem-solving engine for African SMEs and startups.

But code never left my blood. Since 2016, I've clocked 6+ hours daily mastering web development, scripting, networking, and offensive security. Now, I'm merging these worlds: automating pentesting workflows, solving CTFs, and grinding toward my OSCP certification—all while helping businesses thrive with RCG's tech-driven strategies.

What I Do

I help individuals and teams harness entrepreneurial thinking, creative problem-solving, and strategic innovation to excel in digital growth, sales, marketing, and brand loyalty. From startups to established brands, I've guided businesses in scaling smarter while achieving meaningful impact.

  • Red Team & Blue Team Operations
  • Automation of Security Workflows
  • Custom Security Tool Development
  • Penetration Testing & Vulnerability Assessment
  • Strategic Product Development
  • Business Growth Strategy

Let's Connect

I'm available for:

  • Freelance in cybersecurity (pentesting, code audits) or business tech strategy
  • Collaboration on open-source projects, automation tools, or startup ventures
  • Security consulting, whether it's securing your SaaS platform or refining your product's go-to-market plan

Security Tools

Powerful cybersecurity tools created for security professionals

NetReconX

Network Reconnaissance

An advanced network reconnaissance and security assessment tool designed to provide comprehensive network analysis capabilities with a modern, user-friendly approach.

  • Modular architecture
  • Multi-stage scanning
  • Vulnerability detection
  • Detailed reporting
View Documentation

CodeQL Go Automation Suite

Static Code Analysis

A Bash tool to install the CodeQL CLI, pull in the official packs, build your Go project workspace, build a CodeQL database, run custom queries, and decode results. No bs—just repeatable steps and clear outputs.

  • Zero-IDE Setup
  • Terminal-First Workflow
  • Automated analysis pipeline
  • CI/CD integration ready
GitHub Repository

Security Warning

This tool is for authorized security testing only. Always obtain proper authorization before scanning any network. Use responsibly and ethically.