Skip to content

Releases: easypro-tech/brs

# Brabus Recon Suite (BRS) v2.0

30 Jul 22:16

Choose a tag to compare

██████  ██████  ███████ 
██   ██ ██   ██ ██      
██████  ██████  ███████ 
██   ██ ██   ██      ██ 
██████  ██   ██ ███████ 

project: brabus recon suite (brs) | company: easyprotech llc (www.easypro.tech) | developer: brabus | created: 22.07.2025 03:06:28 | version: 2.0 | telegram: https://t.me/easyprotechaifactory

Professional Network Reconnaissance & Penetration Testing Toolkit

by EasyProTech LLC (www.easypro.tech)

Advanced suite of tools for network reconnaissance, domain analysis, vulnerability assessment and penetration testing with enhanced user experience and professional-grade interface.

🚀 What's New in V2.0

Major Enhancements

  • Domain Reconnaissance Module - Comprehensive domain analysis capabilities
  • Professional Interface - Clean, emoji-free menus for serious professionals
  • Advanced Progress Indicators - Live timers and cancellation support
  • Enhanced System Information - Detailed hardware, network, and security reporting
  • Improved Error Handling - Robust interrupt handling and cleanup procedures
  • Streamlined Architecture - Optimized code structure and performance

🎯 Core Improvements

  • Unified Spinner System - Consistent progress indication across all modules
  • Professional Menu Design - Removed emojis from menu items for business use
  • Better Resource Management - Enhanced cleanup and signal handling
  • Optimized Performance - Reduced redundancy and improved speed
  • Enhanced Documentation - Complete feature coverage and usage examples

📝 Development Notes

  • Language Support: Temporarily simplified to English-only during V2.0 development
  • Legacy Compatibility: V1.0 language files remain available in project history
  • Future Roadmap: Multi-language support will be restored in future releases

🚨 CRITICAL LEGAL WARNING

⚠️ UNAUTHORIZED USE IS ILLEGAL AND MAY RESULT IN CRIMINAL PROSECUTION ⚠️

THIS IS A PENETRATION TESTING TOOLKIT FOR AUTHORIZED SECURITY TESTING ONLY

Using this software to scan, probe, or attack networks, systems, or services that you do not own or have explicit written permission to test is ILLEGAL and may result in:

  • Criminal charges and prosecution under computer crime laws
  • Substantial fines (potentially millions of dollars)
  • Prison time (multiple years depending on severity)
  • Permanent criminal record
  • Civil lawsuits for damages and legal costs

AUTHORIZED USE ONLY:

  • Your own networks and systems
  • With explicit written authorization from system owners
  • Within scope of authorized penetration testing contracts
  • As part of legitimate bug bounty programs
  • In controlled educational environments

📦 Installation

git clone https://github.com/EasyProTech/brs.git && cd brs && ./main.sh

🚀 Quick Start

# Clone or extract the project to any directory
cd brs
./main.sh

All paths are automatically resolved relative to the project location.

🎯 Core Modules

1. Network Discovery

Comprehensive local network reconnaissance

Features:

  • Automatic network interface detection
  • Intelligent network range identification
  • Multi-method host discovery (ping sweep, ARP scan)
  • Fast port scanning of discovered hosts
  • MAC address vendor identification
  • Detailed network topology mapping
  • Professional progress indicators with live timers

Improvements in V2.0:

  • Enhanced host detection algorithms
  • Better network interface handling
  • Improved scan performance
  • Professional progress visualization

2. Port Scanning

Advanced port scanning capabilities

Scanning Modes:

  • Fast Scan - Top 1000 ports for quick reconnaissance
  • Full Scan - Complete 65535 port range analysis
  • Stealth SYN Scan - Covert reconnaissance techniques
  • UDP Scanning - UDP service discovery
  • Service Version Detection - Application fingerprinting
  • Aggressive Scanning - OS detection and script scanning
  • Tor Scanning - Anonymous scanning through Tor network
  • Mass Scanning - High-speed scanning with masscan
  • Batch Operations - Scan all discovered hosts automatically

V2.0 Enhancements:

  • Unified progress indication system
  • Better timeout handling
  • Enhanced result formatting
  • Professional interface design

3. Domain Reconnaissance (NEW in V2.0)

Comprehensive domain intelligence gathering

Core Capabilities:

  • Basic Domain Information - DNS records and infrastructure analysis
  • DNS Records Enumeration - Complete DNS record discovery (A, AAAA, MX, NS, TXT, etc.)
  • Subdomain Discovery - Advanced subdomain enumeration techniques
  • Email Harvesting - Email address discovery from various sources
  • Zone Transfer Testing - DNS zone transfer vulnerability assessment
  • Certificate Transparency - SSL certificate log analysis
  • WHOIS Information - Domain registration and ownership data
  • Web Technology Detection - Technology stack identification
  • Social Media Discovery - Social media presence analysis
  • Comprehensive Domain Scan - All-in-one domain assessment

Technical Features:

  • Certificate transparency log integration
  • Advanced subdomain discovery algorithms
  • Email pattern recognition
  • Technology fingerprinting
  • Professional progress indicators

4. Vulnerability Assessment

Professional security vulnerability detection

Assessment Types:

  • NSE Nmap Scripts - Advanced vulnerability detection scripts
  • Web Vulnerability Scanning - Nikto-based web application testing
  • SQL Injection Testing - SQLmap integration for database security
  • SMB Vulnerability Scanning - Windows network service testing
  • SSH Security Testing - SSH configuration and credential testing
  • FTP Security Assessment - FTP service vulnerability analysis
  • Telnet Security Testing - Legacy protocol security assessment
  • Network Shares Discovery - SMB/NFS share enumeration
  • SSL/TLS Analysis - Cryptographic protocol assessment
  • Comprehensive Scanning - Automated multi-vector testing
  • Automated Host Assessment - Batch vulnerability testing

V2.0 Improvements:

  • Enhanced vulnerability detection algorithms
  • Better result categorization
  • Professional progress tracking
  • Improved error handling

5. System Information

Comprehensive system reconnaissance and analysis

Information Categories:

  • Full System Report - Complete system analysis with executive summary
  • System Information - OS, kernel, architecture, hostname, uptime details
  • Hardware Information - CPU, memory, storage analysis
  • Network Configuration - Interface details, routing tables, active connections
  • Security Status - Firewall status, user activity, authentication logs
  • Running Services - Service status analysis and monitoring
  • Connected Devices - USB, PCI, WiFi, Bluetooth device enumeration

V2.0 Features:

  • Professional progress indicators for long operations
  • Enhanced data collection algorithms
  • Better categorization and formatting
  • Timestamped result files
  • Executive summary generation

6. Attack Tools

Professional penetration testing capabilities

⚠️ AUTHORIZED TESTING ONLY!

Attack Categories:

  • Credential Attacks - SSH, FTP, HTTP, Telnet, RDP brute force
  • Network Attacks - DoS attacks, ARP spoofing, MITM operations
  • Web Application Attacks - Directory brute forcing, web-based attacks
  • Wireless Attacks - WiFi security assessment and handshake capture
  • Custom Wordlists - Flexible credential dictionary support

V2.0 Enhancements:

  • Professional progress tracking
  • Better attack success reporting
  • Enhanced logging and documentation
  • Improved safety measures

🛠️ Technical Requirements

System Dependencies

  • nmap - Network mapping and port scanning
  • masscan - High-speed port scanning
  • hydra - Network authentication cracking
  • nikto - Web server vulnerability scanner
  • sqlmap - SQL injection testing tool
  • dig - DNS lookup utility
  • whois - Domain registration lookup
  • curl - HTTP/HTTPS client for web requests
  • jq - JSON processing for API responses
  • john - Password cracking utilities
  • ettercap - Network security toolkit
  • aircrack-ng - WiFi security auditing

System Requirements

  • Ubuntu 22.04+ or compatible Linux distribution
  • Sudo privileges for advanced scanning techniques
  • Minimum 4GB RAM for optimal performance
  • 5GB free disk space for results and wordlists
  • Network interfaces for wireless testing (optional)

📊 Results Management

All scan results are automatically saved with timestamps:

results/
├── 20250722-030628_network_scan.txt
├── 20250722-030645_domain_recon_example.com.txt
├── 20250722-030702_vuln_scan_192.168.1.100.txt
├── 20250722-030715_system_info.txt
└── 20250722-030730_port_scan_192.168.1.0-24.txt

File Naming Convention:

  • YYYYMMDD-HHMMSS_operation_target.txt
  • Automatic result categorization
  • Timestamped for audit trails
  • Professional formatting for reporting

🔧 Configuration Management

Language Configuration (V2.0 Development)

During V2.0 development, the system operates in English-only mode for:

  • Simplified development and testing
  • Consistent user experience
  • Reduced complexity during feature development

Note: Multi-language support from V1.0 is preserved and will be restored in future releases. Language files are available in the project repository for reference.

Professional Interface Settings

  • Clean, emoji-free menu design
  • Consistent progress indication
  • Professional color schemes
  • Business-appropriate formatting

🚀 Usage Examples

Co...

Read more

🧩 Brabus Recon Suite (BRS) — Release v1.0

30 Jun 10:27

Choose a tag to compare

🧹 Brabus Recon Suite (BRS) — Release v1.0

Initial public release of BRS — a professional toolkit for network reconnaissance, vulnerability assessment, and security diagnostics.


✅ Included Modules

  • main.sh — central control interface
  • network_discovery.sh — auto-scan LAN, detect live hosts
  • port_scanner.sh — detailed scanning via nmap, masscan
  • vulnerability_scanner.sh — web vulns, SMB, weak creds, SQLi
  • system_info.sh — full system audit (OS, hardware, security, services)
  • attack_tools.sh — controlled testing (bruteforce, DoS, ARP spoofing, WiFi)

💠 Dependencies (core)

nmap, masscan, hydra, nikto, sqlmap, john, ettercap, aircrack-ng, wireshark

Use Check Tools menu to verify all required components.


🔒 Security Notice

Use BRS only on networks you own or have explicit written permission to test.

This project is provided as-is, without support or warranty.


📁 Project Structure

  • All results saved to results/
  • All modules located in scripts/

🌐 Language Support

English, Russian, German, French, Spanish, Chinese, Turkish


📄 License

MIT License – free to use, modify, redistribute under license terms.


👤 Author

Brabus, EasyProTech LLC
🔗 https://www.easypro.tech/
🔗 https://github.com/EPTLLC/brs