A fast, parallelized, real-time reconnaissance framework built in Python β ideal for CTFs, red teaming, bug bounties, and network audits.
fscan performs multi-faceted reconnaissance against a target domain or IP using Python multithreading for speed and efficiency. Designed for hackers, pentesters, and CTF players, it provides fast insights through concurrent DNS lookups, WHOIS, port scanning, subdomain brute-forcing, and more.
- π DNS Enumeration β Resolves A, MX, TXT, NS, and CNAME records.
- π Subdomain Brute-force β Discover subdomains using a configurable wordlist.
- π Port Scanning β Scans top common ports for open services.
- π WHOIS Lookup β Fetches domain registration and expiration details.
- π€ robots.txt Inspection β Downloads and prints disallowed paths.
- β‘ Multithreaded Execution β Fast concurrent recon using threads.
- π‘ Real-time Output β Results appear as soon as tasks complete.
- β Extensible Architecture β Easy to add your own recon modules.
Install dependencies:
pip install dnspython python-whois requestspython fscan.py example.com| Task | Description |
|---|---|
| DNS Lookup | Resolve A, MX, TXT, NS, CNAME records |
| WHOIS | Domain registration details |
| Port Scan | Check for open ports from a default list |
| Subdomain Brute | Discover subdomains via wordlist |
| robots.txt | Pull and parse robots.txt |
- Output results to JSON/CSV
- Add
asyncioversion for ultra-fast scans - Support IP ranges & CIDRs
- Add full subdomain wordlist support
- WAF detection & TLS fingerprinting
MIT License
Pull requests are welcome! Please submit an issue for feature requests or bugs.
Want me to help with anything else?