ReconX — Network Reconnaissance Toolkit

Python Streamlit License Platform Status Recon Type Category UI Module Contributions Maintained

Overview

ReconX is a powerful, all-in-one network security reconnaissance toolkit built with a modern Streamlit web interface. Designed for penetration testers, ethical hackers, red teamers and cybersecurity enthusiasts, ReconX brings together essential active and passive recon techniques in one lightweight, interactive dashboard.

Whether you’re prepping for a CTF, conducting OSINT, scanning your own infrastructure or just learning the ropes, ReconX empowers you to explore and assess digital footprints — securely, silently and effectively.

Live Demo: ReconX Web App
Source Code: ReconX GitHub

ReconX Logo

Features

Port Scanning

  • Multithreaded TCP port scanner (range: 1–500)
  • Detects open ports, grabs banners, highlights outdated services

OS Fingerprinting

  • Basic TCP handshake analysis to infer Linux/Unix vs Windows OS

WHOIS Lookup

  • Retrieves domain ownership and registrar information

Reverse DNS Lookup

  • Resolves IPs back to domain names (if records exist)

DNS Enumeration

  • Retrieves A, AAAA, MX, NS, CNAME, TXT records for a domain

GhostPath (Passive Recon)

  • Extracts subdomains via "crt.sh"
  • Gathers archived URLs via the Wayback Machine
  • Fully passive — no requests to target servers

Under the Hood: The Engineering Behind ReconX

ReconX isn't just a powerful toolkit; it's a testament to efficient, modular engineering. Beneath its sleek Streamlit interface lies a robust, single-file architecture designed for clarity, performance and easy extensibility.

Core Architecture: Single-File Modularity

Unlike complex multi-file projects, ReconX consolidates all its core reconnaissance functionalities—from Port Scanning to GhostPath—into a single, meticulously organized Python script. Each distinct recon technique is encapsulated within its own dedicated Python class, ensuring a clean, logical separation of concerns.

This streamlined approach offers significant advantages:

Modular Design

Each feature is a self-contained class, promoting clear separation and easier development.

Simplified Debugging

With logic centralized, issues are quicker to pinpoint and resolve within their specific class.

Effortless Contributions

A single-file structure lowers the barrier to entry, welcoming new contributors to understand and extend features.

Interactive Frontend with Streamlit

The intuitive, browser-based user interface of ReconX is dynamically powered by Streamlit. This remarkable Python library transforms complex backend logic into interactive web elements with minimal code. For every reconnaissance class, Streamlit crafts:

This integration ensures that powerful security tasks are accessible and understandable for users of all skill levels.

The Stealthy GhostPath Engine

Beyond active scanning, ReconX integrates the potent GhostPath engine for discreet, passive reconnaissance. Operating entirely in the background, GhostPath queries public data sources to gather intelligence without directly interacting with the target server, leaving no digital footprint. It comprises two specialized internal classes:

GhostPath is an indispensable asset for OSINT (Open Source Intelligence) investigations and stealthy enumeration, providing critical data for a comprehensive security assessment.


Installation & Usage

The quickest way to experience ReconX is through its live web application. You can use it directly, free of cost, fully anonymously and without any limitations on usage!

Alternatively, host it yourself:

Prerequisites

Ensure you have Python 3.x installed.

Clone the Repository

git clone https://github.com/atharvbyadav/ReconX.git
cd ReconX

Install Dependencies

pip install -r requirements.txt

Launch the App

streamlit run ReconX.py

Usage Guide

Port Scanning

Enter the Target IP, hit Scan and see open ports, banners and potential risks.

OS Fingerprinting

Enter an IP and run detection to infer the OS type.

WHOIS Lookup

Enter a domain or IP to view WHOIS data.

Reverse DNS Lookup

Reverse resolve an IP to any registered domain.

DNS Enumeration

Enter a domain name to pull DNS records.

GhostPath (Passive Recon)

Use crt.sh and Wayback Machine to uncover historical data and subdomains.


Disclaimer

This tool is for educational and authorized security research purposes only. Scanning networks you don't own or lack permission to test is illegal.

Use responsibly. Stay ethical.

License

This project is licensed under the BSD 3-Clause License. See the LICENSE file for full details.


Get Involved & Connect

Contributions are welcome! Your ideas, bug fixes or new features can make ReconX even better.

Feel free to fork this repo, improve or expand features and open a pull request.

Have ideas? Open an issue or reach out via the contact links below.


Have questions, feedback, or just want to say hello? Connect with Atharv Yadav and the project through these channels:

"Collaboration is the backbone of innovation. Let’s build better tools together."