Engineering
pentest-osint-recon avatar

pentest-osint-recon

Automated OSINT reconnaissance agent for mapping external attack surfaces, identifying assets, and uncovering security vulnerabilities.

Introduction

The Pentest OSINT Recon skill is a specialized agentic workflow designed for security researchers, penetration testers, and DevSecOps teams to automate the initial phases of external security assessments. By leveraging a multi-stage approach, this agent systematically discovers, categorizes, and analyzes a target organization's internet-facing footprint, transforming raw data into actionable security intelligence. It effectively bridges the gap between manual enumeration and vulnerability assessment, enabling teams to maintain constant awareness of their attack surface.

  • Automated Domain Enumeration: Integrates industry-standard tools like amass and subfinder to map subdomains and identify related infrastructure assets.

  • Tech Stack Profiling: Utilizes httpx and whatweb to perform banner grabbing and fingerprinting on discovered web services, identifying the specific software versions and frameworks in use.

  • Information Leak Detection: Searches through public records, search engines, and theharvester to identify exposed employee emails, social media presence, and leaked credentials.

  • Vulnerability Correlation: Maps identified software versions and technologies against known CVE databases to provide a prioritized view of potential weaknesses.

  • Asset Relationship Mapping: Correlates IP addresses, domains, and web technologies to identify hidden connections or neglected shadow IT infrastructure.

  • Input requirements include a target domain or organization name and a defined scope for the assessment.

  • Expected outputs consist of a structured reconnaissance report, including a list of active subdomains, identified technology stacks, detected vulnerabilities (CVEs), and exposed information pointers.

  • The agent is designed to run periodically, allowing for continuous attack surface monitoring as the target organization's infrastructure changes.

  • Users should ensure all reconnaissance activities are performed within the scope of authorized penetration testing agreements and follow responsible disclosure practices.

  • Performance may vary based on external tool availability and the target's network security posture, such as rate-limiting or WAF interference.

Repository Stats

Stars
267
Forks
52
Open Issues
16
Language
Python
Default Branch
main
Sync Status
Idle
Last Synced
May 3, 2026, 09:38 AM
View on GitHub