Releases: ExRecon/exrecon
ExRecon v2.0 - Major Upgrade
Codename: The Stealth Analyst
🌟 What's New
🧠 Multi-Scan Selector
Choose multiple scan types in one run with comma-separated input (e.g., 1,3,5).
🔒 TOR + ProxyChains4 Integration
All scans are anonymized via TOR with automatic exit node rotation and verification.
🎭 Decoy Support (Version-Aware)
Automatically uses --decoy if your Nmap version supports it.
🧱 Firewall Evasion Module
TTL spoofing, MAC address spoofing, and data obfuscation built in.
🌐 Web App Enumeration
Integrates Nikto and HTTP enumeration NSE scripts.
📜 Human-Readable Report Generator
Automatically outputs .txt, .pdf, and .delta scan summaries.
📂 Unified Log Directory
All output saved in ~/tor_scan_logs/ with timestamped file names.
🛠️ Self-Installer Built-in
Detects and installs required tools: nmap, proxychains4, tor, nikto, enscript, and more.
🔐 Removed auto-encryption/self-destruct for audit transparency and persistence.
📑 Summaries now compare scan anomalies with diff against your previous run.
📈 Results viewer lets you read reports interactively with bat, less, or xdg-open.
📁 Files Added
exrecon.sh — Main automation script
exrecon-install.sh — Dependency auto-installer
README.md — Tool overview and usage
CHANGELOG.md — Version history
.gitignore — Clean repo ignores
🧠 Author
Created by: ExRecon
“Master Kali Linux, Excel in Offensive Security” 🔥
ExRecon v1.0
📜 Changelog
[v1.0] - 2025-06
Added
- Initial public release of ExRecon
- Support for TOR-routed Nmap scanning
- Random decoy IP generation
- AES256 encrypted scan logs
- Self-destruct feature for encrypted outputs after 10 minutes
- Multiple scan modes: Quick, Service Detection, UDP + Fragmentation
- TOR IP verification with fallback
- Encrypted log summary file
- SHA256 checksum generation for output integrity
Notes
- Designed for use in authorized offensive security assessments only.
- Compatible with Kali Linux and Debian-based systems.