ReconGPT Automapper is an advanced cybersecurity reconnaissance tool that combines traditional reconnaissance techniques with artificial intelligence to create an intelligent picture of a target's infrastructure and identify the most vulnerable attack points.
-
Aggregates data from well-known recon tools:
amassβ for discovering subdomainssubfinderβ for additional subdomain enumerationhttpxβ for scanning open protocols and portsnucleiβ for surface vulnerability analysis
-
AI-powered analysis using GPT to:
- Classify domains by importance and risk level
- Detect suspicious patterns (e.g., dev, staging, admin, test)
- Provide target prioritization
- Generate actionable recommendations
-
Interactive attack surface mapping:
- Visual relationships between targets
- Domain hierarchy and connections
- Key touchpoints identification
- Integration suggestions for complementary tools
| Function | Practical Example |
|---|---|
| Target classification | "This domain runs on Port 8080, without HTTPS β High risk." |
| Pattern detection | "The word 'internal' in internal.api.example.com indicates an internal environment β Test SSRF." |
| Relationship analysis | "login.example.com uses SSO linked to api.example.com β Try Auth Bypass." |
| Complementary tools | "Run JSFlow AI on these domains to extract more API endpoints from JavaScript." |
- Visual map showing domain structure, services, protocols, and critical points
- AI-generated intelligence report with smart recommendations
- JSON, HTML, and TXT outputs for integration or documentation
- Prioritized attack lists with confidence scoring
- Clone the repository and install dependencies:
pip install -r requirements.txt- Set up your OpenAI API key:
export OPENAI_API_KEY="your-api-key-here"- (Optional) Install reconnaissance tools for full functionality:
# Install tools based on your OS
# amass, subfinder, httpx, nucleipython recongpt.py scan target.com# Review AI analysis without applying automatically (professional workflow)
python recongpt.py scan target.com --ai-review-only --format html
# Filter for high-value targets (dev/admin/test domains)
python recongpt.py scan target.com --filter "domain~='dev|admin|test|staging'"
# Focus on unusual ports (not 80/443)
python recongpt.py scan target.com --filter "port!=443 && port!=80"
# Extended tool set for comprehensive reconnaissance
python recongpt.py scan target.com \
--tools amass subfinder httpx nuclei dnsx waybackurls \
--output ./results \
--format json \
--ai-review-only \
--verbose
# Clean, professional HTML reports
python recongpt.py scan target.com --format html --output ./reports
# Integration-ready JSON output
python recongpt.py scan target.com --format json --output ./integration# List all scans
python recongpt.py list
# View specific scan details
python recongpt.py list --scan-id 1DOMAIN- Target domain to scan--tools- Specify tools to use (default: amass, subfinder, httpx, nuclei, dnsx, waybackurls)--output- Output directory for results--format- Output format: json, html (optimized for integration and reporting)--analyze/--no-analyze- Enable/disable AI analysis (default: enabled)--ai-review-only- NEW: Run AI analysis for review only, don't apply automatically--filter- NEW: Smart filtering with syntax like"port!=443 && domain~='dev|admin'"--show-graphs/--no-graphs- Optional graph generation (disabled by default for CLI focus)--verbose- Enable verbose output
--filter "domain~='dev|admin|test|staging'" # High-value keywords
--filter "port!=443 && port!=80" # Unusual ports only
--filter "domain~='api' && port!=443" # API endpoints without HTTPS# 1. Run comprehensive scan
python recongpt.py scan target.com --output ./target_results --verbose
# 2. Review results
python recongpt.py list --scan-id 1
# 3. Generate different format reports
python recongpt.py scan target.com --format html --output ./reports{
"scan_info": {
"domain": "target.com",
"scan_id": 1,
"timestamp": "20240101_120000",
"total_findings": 150
},
"findings": [...],
"ai_analysis": {
"overall_priority": 0.8,
"confidence": 0.9,
"high_priority_targets": [...],
"recommendations": [...]
}
}- Priority Scoring: Automatic ranking of findings based on security impact
- Pattern Recognition: Identifies suspicious subdomain patterns (dev, admin, test, staging)
- Relationship Mapping: Discovers connections between services and domains
- Risk Assessment: Confidence scoring and actionable recommendations
- Attack Path Analysis: Suggests logical progression for security testing
Scenario: You target target.com
-
Run ReconGPT Automapper:
python recongpt.py scan target.com
-
Get comprehensive results:
- 100+ subdomains discovered
- Prioritized attack list with risk scores
- Interactive attack surface map
- AI-driven offensive recommendations
-
Follow AI recommendations:
- Start with high-priority targets
- Test identified vulnerability patterns
- Investigate suspicious subdomain relationships
- Review Mode:
--ai-review-onlylets you review AI suggestions before applying - Intelligent Linking: Detects SSRF risks between API and auth domains
- Pattern Recognition: Identifies suspicious keywords and port configurations
- Confidence Scoring: Provides confidence levels with all recommendations
# Examples of professional filtering
--filter "domain~='dev|admin|test'" # Development/admin interfaces
--filter "port!=443 && domain~='api'" # Unencrypted API endpoints
--filter "domain~='staging|internal'" # Internal staging environments# Pipe high-priority targets to httpx
cat output.json | jq -r '.ai_analysis.high_priority_targets[]? | .target?' | httpx -silent
# Extract subdomains for nuclei scanning
cat output.json | jq -r '.findings[] | select(.type=="subdomain") | .target' | nuclei -silent
# Generate custom wordlists from patterns
cat output.json | jq -r '.findings[].target' | cut -d'.' -f1 | sort -u > wordlist.txt- CLI-focused: No web interface security risks, perfect for headless environments
- Lightweight HTML: Clean reports without heavy JavaScript or graphics
- Extended tool support: amass, subfinder, httpx, nuclei, dnsx, waybackurls
- Smart prioritization: AI identifies unusual ports, suspicious patterns, potential SSRF
- Integration-ready: JSON output designed for piping to other tools
- Python 3.11+
- OpenAI API key (for AI analysis features)
- Optional: amass, subfinder, httpx, nuclei tools for full functionality
Professional cybersecurity tool for authorized testing only.