back to top

Reconftw tools feature and commands

Getting your Trinity Audio player ready...

Reconnaissance is the foundation of any successful penetration test or bug bounty assessment. Automating this process can save hours of time and provide more accurate results. ReconFTW is one such powerful tool, developed to streamline and automate the entire reconnaissance process. Built primarily for bug bounty hunters and penetration testers, ReconFTW integrates multiple tools into one smooth workflow.

In this article, we’ll dive deep into ReconFTW’s features, included tools, and essential commands to help you understand how it works and how to use it effectively.

What is ReconFTW?

ReconFTW is an open-source reconnaissance automation framework built in Bash. It aims to cover end-to-end recon, starting from subdomain enumeration to active web exploitation techniques. It is designed for Linux and macOS and can be run on VPS, WSL, or cloud instances.

ReconFTW is maintained on GitHub by @six2dez, and it’s popular for its speed, wide tool integration, and easy-to-read outputs.

Key Features of ReconFTW

1. Fully Automated Workflow

ReconFTW automates the entire recon process—from subdomain enumeration to vulnerability detection—with little or no user interaction.

2. Integration of Powerful Tools

It integrates over 30+ popular recon tools,

3. Organized Output

All results are stored in neatly organized folders with logs and categorized findings

output/
└── domain.com/
├── subdomains/
├── screenshots/
├── web-analysis/
├── vulnerabilities/
└── logs/

4. Passive and Active Scanning

ReconFTW supports both passive (no interaction with the target) and active (direct interaction with the target) reconnaissance.

5. Modular Configuration

You can customize ReconFTW to enable/disable tools or actions according to your preference through the config/ directory.

(: Read More 🙂

ReconFTW Tool Stack (Main Tools Used)

reconftw tools
Reconftw tools feature and commands 2

ReconFTW brings together the best tools from the bug bounty and hacking community. ReconFTW combines over 30+ powerful security tools to perform end-to-end reconnaissance. Here’s the categorized breakdown:

1. Subdomain Enumeration Tools

ToolWorking / Purpose
subfinderFinds subdomains using passive sources like search engines and APIs.
amassDiscovers subdomains using both passive and active techniques (DNS brute force, scraping, etc.).
assetfinderQuickly finds subdomains related to a domain from known sources.
findomainFast subdomain finder that supports multiple APIs.
sublist3rUses multiple search engines to gather subdomains.
chaos clientPulls subdomains from Project Discovery’s Chaos DB (requires API key).
github-subdomainsExtracts subdomains from public GitHub repositories.

2. DNS Resolution and Probing

ToolWorking / Purpose
dnsxResolves subdomains to IPs; supports wildcard filtering.
shufflednsDNS brute-forcer that supports multiple resolvers for speed and accuracy.
massdnsHigh-performance DNS resolver used by shuffledns.
purednsAnother DNS resolution tool with support for massive bruteforce.
mapcidrConverts IP ranges to CIDR and vice versa; useful for network scoping.

3. HTTP Probing and Web Enumeration

ToolWorking / Purpose
httpxProbes subdomains for live web services (detects status code, title, technologies, etc.).
httprobeSimilar to httpx, checks which hosts have active HTTP/HTTPS services.
gau (GetAllURLs)Fetches archived URLs from public sources like Wayback Machine.
waybackurlsAnother tool to fetch historical URLs from web archives.
hakrawlerWeb crawler that finds hidden links and endpoints.
katanaFast web crawler by ProjectDiscovery that supports JS parsing and single-page apps.

4. Port Scanning and Network Mapping

ToolWorking / Purpose
naabuFast port scanner (alternative to nmap); discovers open ports.
nmapIndustry-standard tool for scanning ports and running detailed service scans.
rustscanLightning-fast port scanner written in Rust.
mapcidrHelps in visualizing IP spaces and converting formats.

5. Vulnerability Scanners

ToolWorking / Purpose
nucleiTemplate-based vulnerability scanner for fast and accurate scanning (XSS, SQLi, SSRF, etc.).
dalfoxSpecialized XSS scanner that detects reflected/stored XSS.
kxssFinds potential XSS reflection points in parameters.
gf (grep patterns)Filters interesting patterns like XSS, SSRF, RCE from URLs using custom regex.
interactsh-clientOut-of-band interaction tool to detect SSRF, RCE, etc.
jaelesFlexible vulnerability scanner using YAML-based templates (like nuclei).
niktoScans for common web vulnerabilities and server misconfigurations.

6. Content Discovery (Fuzzing)

ToolWorking / Purpose
ffufFast web fuzzer for discovering hidden files, directories, parameters, and endpoints.
dirsearchBrute-forces directories and files on web servers using wordlists.

7. Screenshot and Visual Recon

ToolWorking / Purpose
gowitnessCaptures screenshots of live web services.
aquatoneTakes screenshots and collects headers for websites.

8. Parameter and JS Analysis

ToolWorking / Purpose
arjunFinds hidden GET/POST parameters from web applications.
linkfinderExtracts endpoints and links from JavaScript files.
xnLinkFinderExtended version of linkfinder for modern JS parsing.

9. Miscellaneous Tools

ToolWorking / Purpose
unfurlBreaks down URLs into structured components for analysis.
qsreplaceReplaces query string values, useful in fuzzing and payload injection.
notifySends notifications (Slack, Discord, Telegram) when tasks complete.
uroCleans and deduplicates URL lists.
dnsgenGenerates permutations of subdomains for bruteforce.
tlsxFetches TLS information from servers.
github-endpointsExtracts endpoints from JavaScript files on GitHub.

How ReconFTW Uses These Tools

ReconFTW runs these tools in logical order:

  1. Subdomain discovery
    → (subfinder, amass, findomain, etc.)
  2. DNS resolution
    → (dnsx, massdns, shuffledns)
  3. Port scanning
    → (naabu, nmap, rustscan)
  4. HTTP probing & URL extraction
    → (httpx, gau, waybackurls, hakrawler)
  5. Vulnerability detection
    → (nuclei, dalfox, gf, interactsh-client)
  6. Directory/parameter fuzzing
    → (ffuf, arjun, dirsearch)
  7. Visual recon
    → (gowitness, aquatone)
  8. Reporting & cleanup
    → Organized results in the /output folder, optionally sends alerts via notify.

Common ReconFTW Commands

Installation

git clone https://github.com/six2dez/reconftw.git
cd reconftw
./install.sh

This command installs all necessary tools and dependencies.

Basic Recon Command

./reconftw.sh -d example.com

This command runs the default recon mode against example.com

Passive Recon Only

./reconftw.sh -d example.com -p

This restricts ReconFTW to passive methods only. No direct interaction is made with the target

Enable All Modules

./reconftw.sh -d example.com -a

This enables all modules, including active scanning, screenshotting, vulnerability detection, etc.

Scope In / Out

./reconftw.sh -l domains.txt –in-scope scope.txt –out-scope exclude.txt

You can provide:

  • A list of domains in domains.txt
  • An --in-scope file to define allowed targets
  • An --out-scope file to exclude forbidden domains

Use Custom Wordlist for Fuzzing

./reconftw.sh -d example.com –wordlist custom.txt

This allows you to use your own wordlist for directories and parameter fuzzing

Use Proxy or VPN

./reconftw.sh -d example.com –proxy socks5://127.0.0.1:9050

Useful for anonymizing your scans via Tor or VPN proxy.

Resume a Previous Scan

./reconftw.sh -d example.com -r

If the scan was interrupted, this lets you resume from the last step.

Get Help

./reconftw.sh -h

Displays the full help menu with all available options.

Tips for Using ReconFTW Effectively

Run on VPS: ReconFTW is resource-intensive. Running it on a cloud VPS ensures better performance

Customize Configuration: You can edit the tools and settings inside config/ folder to match your style

Use with APIs: Tools like subfinder and amass require API keys for full functionality

Combine with Burp Suite: Export interesting URLs and feed them into Burp for manual testing

Regular Updates: Tools used by ReconFTW often receive updates. Run ./install.sh occasionally to keep them up-to-date

ReconFTW is one of the most powerful reconnaissance tools available today. Its strength lies in automation, modularity, and tool integration. Whether you are a beginner in ethical hacking or a seasoned bug bounty hunter, ReconFTW can significantly enhance your recon workflow and help you uncover more vulnerabilities in less time.

If you’re serious about web application security, understanding and using ReconFTW is a game changer, for more help you can write an email on contact@widelamp.com without any delay, I am always welcome

Pradeep Sharma
Pradeep Sharmahttps://pradeepsharma.widelamp.com
A cybersecurity and physics expert, skilled in quantum computing, Cybersecurity and network security, dedicated to advancing digital and scientific innovation.
0 0 votes
Article Rating
Subscribe
Notify of
guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Previous article

Popular Articles

0
Would love your thoughts, please comment.x
()
x