
I Built a Python Recon Toolkit and It Exposed My Own Server
I've always been into offensive security. Watching people do CTFs on YouTube got me hooked early, I loved how it requires networking knowledge, programming, and critical thinking all at once. This year, finishing my CS degree, I decided to stop watching and build something. The result is PyRecon-Suite , a modular Python recon toolkit with four modules: subdomain enumeration, TCP port scanning, PHP webshell detection, and HTTP header analysis. Nothing revolutionary, but building it taught me more than I expected, and it found something on my own infrastructure I didn't know was there. How it works Single CLI entry point, four subcommands: python main.py subdomain --target example.com --wordlist wordlists/subdomains.txt python main.py portscan --target example.com --ports 1-1000 python main.py phpshell --target http://example.com --wordlist wordlists/shells.txt python main.py httpheader --target https://example.com Subdomain enumeration resolves each wordlist entry as a hostname via DNS
Continue reading on Dev.to Python
Opens in a new tab



