A Python-based GUI tool for offensive reconnaissance, integrating powerful scanning utilities like Nmap, Nikto, SQLMap, Gobuster, Metasploit, and Hydra — all under one sleek interface powered by CustomTkinter.
- 🔍 One-click scan execution via GUI
- 🧠 Intelligent domain/IP recognition
- 📦 Results saved automatically (
/resultsfolder) - ⚙️ Customizable scan options (ports, SQLMap URLs, force mode)
- 🧾 Exportable PDF scan reports
- 🪪 Dark Mode GUI powered by
CustomTkinter - 🛠 Hydra Brute Force login support (adding soon!)
- ✅ Supports both
HTTP&HTTPSfallback
| Tool | Purpose |
|---|---|
| Nmap | Port scanning & service detection |
| Nikto | Web server vulnerability scan |
| SQLMap | SQL injection testing |
| Gobuster | Directory brute forcing |
| Metasploit | Multi-module exploit scanner |
- Python 3.10+
- Git
- Dependencies (see below)
pip install -r requirements.txtgit clone https://github.com/farixzz/CyberReconScanner.git
cd CyberReconScanner
python main.py- Run
main.py - Enter the target IP or domain.
- Select tools to include (e.g., Nmap, GoBuster).
- Hit "Run Scan" and view results in terminal or
/resultsfolder.
Contributions, issues, and feature requests are welcome!
Feel free to fork the repo and submit a pull request.
This project is licensed under the MIT License - see the LICENSE file for details.
Faris Muhammed
Ethical Hacker & Cybersecurity Analyst | Specializing in VAPT, Python Automation & OSINT Tools
🔗 LinkedIn
💻 GitHub
🌐 Portfolio
This tool is developed strictly for educational purposes and authorized security testing only. Cyber Recon Scanner is intended to aid ethical hackers and security professionals in conducting secure and legal reconnaissance on systems they own or have explicit permission to test.
❌ Do NOT use this tool for any unauthorized or malicious activity.
The developer is not responsible for any misuse or damage caused by this tool. Always follow your local laws and industry best practices.
