A python script for automatically scanning a network with nmap/scan6 and creating a draw.io export with the help of nplan.
Recool is short for Reconnisance Tool.
The easiest way to scan your network with recool is to use the official docker image. You can append recool arguments to the docker command as normal.
docker pull kryptolyser/recool
docker run -it --rm --net=host -v ./dist:/recool/dist kryptolyser/recool -I eth0
- Python3.9 (might work with earlier versions)
- nplan
- nmap
- scan6 (
sudo apt install ipv6-toolkit
)
- Clone the repository
git clone https://github.com/Kryptolyser/recool
- Go into the repository folder
cd recool
- Install python requirements
python3 -m venv .venv source .venv/bin/activate python3 -m pip install -r requirements.txt
- Done
To start scanning simply type the following:
sudo .venv/bin/python3 recool.py -I eth0
If recool can't find the nplan binary (because it isn't in your path variable) simply add the ~/go/bin
folder to the path variable or specifify it when you run recool like:
sudo .venv/bin/python3 recool.py -I eth0 --nplan-path ~/go/bin/nplan
By default recool will store its saves and output in the ./dist
folder. (You can change this location with the --storage-folder PATH
flag)
Recool saves the current progress! Therefore, you can safely exit the program and when you restart it, it will continue where it left off.
- Ping scan on /24 subnet
- Full scan for all discovered hosts (All ports, service informations, os identification)
- Aggressive scan on /24 subnet (Fast nmap scan without host discovery)
- IPv6 scan with scan6
- Ping scan for routers (devices with .1 ip-ending) in /16 subnet
- For each discovered router scan /24 subnet of router like step 2 and 3
- Everything is automated!
- A nice interface with a menu for every scan
- Recool directly outputs full scanned hosts, so you can immediately start hacking!