You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+16Lines changed: 16 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,22 @@ Contributions are more than welcome!
9
9
10
10
This tool is based heavily upon the work made public in Mike Czumak's (T_v3rn1x) OSCP review ([link](https://www.securitysift.com/offsec-pwb-oscp/)) along with considerable influence and code taken from Re4son's mix-recon ([link](https://whitedome.com.au/re4son/category/re4son/oscpnotes/)). Virtual host scanning is originally adapted from teknogeek's work which is heavily influenced by jobertabma's virtual host discovery script ([link](https://github.com/jobertabma/virtual-host-discovery)). Further Virtual Host scanning code has been adapted from a project by Tim Kent and I, available here ([link](https://github.com/codingo/VHostScan)).
11
11
12
+
# Installation
13
+
To install Reconnoitre first make a local copy of the repository by performing the following where you wish it to be located:
After you have done this run setup.py with the following:
19
+
```
20
+
python setup.py install
21
+
```
22
+
23
+
After setup has run Reconnoitre will now be in your path (as reconnoitre) and you can launch it anywhere using:
24
+
```
25
+
reconnoitre <args>
26
+
```
27
+
12
28
# Usage
13
29
14
30
This tool can be used and copied for personal use freely however attribution and credit should be offered to Mike Czumak who originally started the process of automating this work.
0 commit comments