A comprehensive Bash-based network scanning and security assessment toolkit for cybersecurity professionals
NetReconX provides a comprehensive suite of network scanning and security assessment tools
Progressive scanning from basic discovery to advanced exploitation techniques
Detailed service identification and version detection
Identify security weaknesses in target systems
Tools are executed based on discovered services and ports
Comprehensive output of scan results for analysis
User-friendly interface with colorful, animated outputs
Schedule scans to run later or pause for manual execution
Easily integrate new tools into the framework
Get started with NetReconX in just a few steps
git clone https://github.com/madedis/NetReconX.git
cd NetReconX
chmod +x NetReconX.sh
touch config.cfg
sudo apt-get update
sudo apt-get install nmap curl hydra smbclient enum4linux
./NetReconX.sh
Learn how to use and extend NetReconX
NetReconX can be run with various options to control scanning behavior:
# Basic scan
./NetReconX.sh
# Run with specific stage and target
./NetReconX.sh <stage> <target>
# Run postponed tools
./NetReconX.sh --run-postponed
NetReconX uses a multi-stage approach to scanning:
| Stage | Purpose | Description |
|---|---|---|
| 0 | Initial Discovery | Host discovery, basic port scanning, service detection |
| 1 | Service Enumeration | Detailed service version detection, OS fingerprinting, script scanning |
| 2-3 | Advanced Testing | Vulnerability assessment, brute force testing, service-specific scanning |
NetReconX incorporates various security assessment tools:
Extend NetReconX with your own tools by following these steps:
# 1. Add a new case statement in the tooler() function:
your_new_tool_name)
echo "Running your new tool..."
# Tool implementation here
output_file="$OUTPUT_DIR/your_tool_output.txt"
your_tool_command "$target" > "$output_file"
# Wait for completion and cleanup
wait $!
echo "Completed"
# Remove from postponed list if applicable
if [[ -n "${POSTPONED_TOOLS[$tool]}" ]]; then
unset "POSTPONED_TOOLS[$tool]"
unset "TOOL_STATUS[$tool]"
save_postponed_state
fi
;;
# 2. For service-based tools, add them to the DEPLOYED_TOOL_AGENT array:
DEPLOYED_TOOL_AGENT=(
["your_tool"]="TOOL_ID"
# Existing tools...
)
# 3. Map the tool to specific services in the DEMARCHE array:
DEMARCHE=(
["service_name"]="your_tool,other_tools"
# Existing mappings...
)
Create custom scanning stages for specialized scans:
# 1. Create a new stage array:
STAGE_X=(
["option1"]="${SOME_OPTION}"
["option2"]="${ANOTHER_OPTION}"
)
# 2. Add the stage to the case statement in the tooler function:
case $stage in
X)
log "Starting Stage X scan."
for option_group in "${!STAGE_X[@]}"; do
option="${STAGE_X[$option_group]}"
scan_options+="$option "
done
;;
# Existing stages...
esac
Customize NetReconX by creating a
config.cfg file with these settings:
# Network settings
DEFAULT_TARGET="192.168.1.1"
DEFAULT_TIMEOUT=5
# Tool paths (if not in PATH)
NMAP_PATH="/usr/bin/nmap"
CUSTOM_TOOL_PATH="/path/to/custom/tool"
# Output settings
OUTPUT_DIR="./custom_output_dir"
DEBUG_MODE=true
NetReconX organizes results in the following locations:
Get NetReconX and start scanning today
Meet the cybersecurity expert behind NetReconX
Product Strategy Maven with a Knack for Cybersecurity | Ready to Tackle Red Team & Blue Team Missions!
Every day presents a new opportunity to contribute to a world that is more innovative, impactful, and compassionate. I'm an eternal optimist who sees challenges as stepping stones to success. No goal is too ambitious, no problem without a solution—creativity, perseverance, and vision can turn even the boldest dreams into reality.
My passion lies in transforming ideas into powerful, tangible experiences that resonate on a global scale. I believe obstacles are simply hidden opportunities, and I'm always eager to explore the next breakthrough that could redefine how people engage with the world.
I grew up in a world where "Computer science" was dinner-table conversation. By age 10, I was tinkering with a family laptop (circa 2000!), watching my brothers dive into hacking and network security. Fast-forward to my late twenties: I've spent 5+ years studying economics and marketing, dropped out of business school, and built RCG Consulting—a digital problem-solving engine for African SMEs and startups.
But code never left my blood. Since 2016, I've clocked 6+ hours daily mastering web development, scripting, networking, and offensive security. Now, I'm merging these worlds: automating pentesting workflows, solving CTFs, and grinding toward my OSCP certification—all while helping businesses thrive with RCG's tech-driven strategies.
I help individuals and teams harness entrepreneurial thinking, creative problem-solving, and strategic innovation to excel in digital growth, sales, marketing, and brand loyalty. From startups to established brands, I've guided businesses in scaling smarter while achieving meaningful impact.
I'm available for:
Powerful cybersecurity tools created for security professionals
An advanced network reconnaissance and security assessment tool designed to provide comprehensive network analysis capabilities with a modern, user-friendly approach.
A Bash tool to install the CodeQL CLI, pull in the official packs, build your Go project workspace, build a CodeQL database, run custom queries, and decode results. No bs—just repeatable steps and clear outputs.
This tool is for authorized security testing only. Always obtain proper authorization before scanning any network. Use responsibly and ethically.