ExRecon is a stealth-oriented reconnaissance and scanning utility designed for Kali Linux. It automates advanced Nmap scans over the TOR network, validates anonymity, logs results in clean summaries, and allows optional log viewing — all while supporting multiple recon modes.
| Capability | Description |
|---|---|
| TOR integration | Routes all scans through TOR using proxychains4, and rotates exit nodes |
| Auto dependency check | Detects and installs required tools like Nmap, Nikto, TOR, enscript, and more |
| Modular scans | User selects multiple scan types simultaneously |
| Service detection | Uses Nmap scripts and custom UA strings to detect services behind firewalls |
| Firewall evasion | Spoofs MAC address, modifies TTL, and optionally uses decoys |
| Nikto web audit | Launches Nikto after detecting HTTP/HTTPS ports |
| Live result viewer | Lets the user preview results using bat, less, or xdg-open |
| Formatted reporting | Generates .txt and .pdf scan summaries with deltas vs previous scan |
| Version-aware decoys | Uses --decoy only if supported by the installed Nmap version |
ExRecon automatically checks and installs the following:
nmapproxychains4torcurlgpgtmuxnetcat-openbsdopensslenscriptghostscriptpandocnikto
chmod +x exrecon.sh
./exrecon.shOn first run, ExRecon will:
- Ensure all required tools are installed
- Patch
/etc/tor/torrcto allow TOR control viaControlPort - Rotate TOR circuits before each scan
- Create log storage directory
~/tor_scan_logs
./exrecon.sh- Enter target domain or IP when prompted
- Select one or more scan modes (comma-separated)
- Wait for scan to finish and optionally view results
~/tor_scan_logs/
- Raw scan logs:
scan_<timestamp>.* - Summary Report:
scan_summary_<timestamp>.txt - Printable PDF:
scan_summary_<timestamp>.pdf - Anomaly comparison:
scan_summary_<timestamp>.delta
- 🔑 Run as root for full feature access (SYN scans, MAC spoofing)
- 🚦 TOR is validated before every scan; circuit is rotated
- 🌐 All traffic is routed via TOR using ProxyChains
- 🧹 Self-destruct functionality has been disabled in this version for report preservation
ExRecon is intended strictly for educational and authorized penetration testing purposes.
MIT License — see LICENSE file for details.
This repository can use an optional GitHub Actions workflow to summarize new or updated issues and pull requests for maintainers.
- Workflow:
.github/workflows/ai-maintainer-summary.yml - Script:
.github/scripts/ai_maintainer.py - Setup guide:
README_AI_SETUP.md
To enable it, add the repository secret OPENAI_API_KEY.
You can also optionally add the repository variable OPENAI_MODEL. If it is not set, the workflow uses gpt-5.4-mini.
The workflow posts one updatable comment with:
SummaryImpactFollow-ups
ExRecon developed by ExRecon as part of Offensive Security tooling — for the Greater Good. ❤️🔥

