tugarecon

TugaRecon

version python license issues stars

TugaRecon is an advanced subdomain enumeration and DNS reconnaissance tool built for security researchers, penetration testers, and OSINT professionals.
It combines multiple passive and active modules to extract, verify, and map subdomains of a target domain efficiently.


TugaRecon, tribute to Portuguese explorers reminding glorious past of this country.

During the 15th and 16th centuries, Portuguese explorers were at the forefront of European overseas exploration, which led them to reach India, establish multiple trading posts in Asia and Africa, and settle what would become Brazil, creating one of the most powerful empires.

skynet0x01


πŸ“Έ TugaRecon

tugarecon


πŸš€ Features


Use TugaRecon only on targets you have explicit permission to test. The author is not responsible for misuse. Unauthorized use of this tool may be illegal.


πŸ“„ License

This project is licensed under GNU GPLv3. The source file headers include the GPLv3 license and a patent restriction clause β€” the README has been updated to reflect that.


πŸ“¦ Requirements & Dependencies

Minimum requirements:

Main dependencies (install via pip install -r requirements.txt):

dnspython>=2.8.0
whois>=1.20240129.2
DateTime>=5.5
requests>=2.32.5
urllib3>=2.5.0
progress>=1.6.1
asyncio>=4.0.0
pydot>=4.0.1
networkx>=3.5
ipwhois>=1.3.0
pyvis>=0.3.2
multiprocess>=0.70.18
pandas>=2.3.3
argparse>=1.4.0
matplotlib>=3.10.3
networkx>=3.5
graphviz>=0.20.3
tldextract>=5.1.2
colorama>=0.4.6
lxml>=5.2.2
beautifulsoup4

πŸ“¦ Installation

git clone https://github.com/skynet0x01/tugarecon.git
cd tugarecon
pip3 install -r requirements.txt

βœ… Recommended: Run in a Python virtual environment
python3 -m venv venv && source venv/bin/activate


βš™οΈ Basic Usage

python3 tugarecon.py -d example.com

Main options

Option Description
-d, --domain Target domain (required), e.g.: example.com
-b, --bruteforce Enable brute-force mode (uses internal wordlists under wordlists/)
-e, --enum Select specific modules (e.g.: --enum ssl certspotter) β€” if omitted, all supported modules run
-t, --threads Number of concurrent threads (default: 250)
-m, --map Generate a network/visual map of the domain
-r, --results Show previously saved results (invoked without arguments)

Note: The previous README mentioned a --full flag; the current behavior is: if --enum is not passed, all configured modules run by default.


πŸ”Ž Examples

Run all modules (default):

python3 tugarecon.py -d google.pt

Run specific modules only:

python3 tugarecon.py -d example.com --enum certspotter hackertarget

Brute-force using internal wordlists:

python3 tugarecon.py -d example.com --bruteforce
# or
python3 tugarecon.py -d example.com -b

Generate a visual map (relies on the existing visualization utilities):

python3 tugarecon.py -d example.com -m

View saved results (shortcut):

python3 tugarecon.py -r

Typical output

output/
β”œβ”€β”€ tugarecon/results/example.com/2025-07-18/subdomains_clustered.svg
β”œβ”€β”€ tugarecon/results/example.com/2025-07-18/subdomains_clustered.pdf
β”œβ”€β”€ tugarecon/results/example.com/2025-07-18/tuga_bruteforce.txt
└── tugarecon/results/example.com/2025-07-18/subdomains.txt

🧩 Modules (overview)

Module Type Function / Source
certspotter Passive Certificate Transparency logs
hackertarget Passive HackerTarget public API
alienvault Passive Collaborative platform for global threat intelligence.
DNSDumpster Passive Extraction from dnsdumpster. ** New **
bruteforce Active Dictionary-based brute-force using wordlists
dnsresolve Resolver Resolve IPs with fallback DNS
mapbuilder Visual Generate maps (HTML / Graphviz / pyvis)

The full list of modules is inside modules/ and can be extended.



πŸ›  Project structure

tugarecon/
β”œβ”€β”€ modules/
β”‚   β”œβ”€β”€ certspotter.py
β”‚   β”œβ”€β”€ hackertarget.py
β”‚   └── ...
β”œβ”€β”€ utils/
β”‚   β”œβ”€β”€ tuga_colors.py
β”‚   β”œβ”€β”€ tuga_banner.py
β”‚   └── ...
β”œβ”€β”€ wordlists/
β”‚   β”œβ”€β”€ first_names.txt
β”‚   └── next_names.txt
β”œβ”€β”€ results/
β”œβ”€β”€ tugarecon.py
β”œβ”€β”€ requirements.txt
└── README.md

🧭 Roadmap (excerpt)



πŸ“Έ Example Map Output

Example Subdomain Map


🀝 Contributing

We welcome contributions!
Please read the CONTRIBUTING.md file before submitting pull requests.



πŸ‘€ Author

Skynet0x01
Cybersecurity Researcher & Tool Developer
🌍 Portugal


πŸ“„ License

This project is licensed under the MIT License.

πŸ’– Support & Donations

If you find this project useful, consider supporting its continued development.
Your contributions help add new features, improve stability, and keep the tool updated.

πŸ”— Donate with your favorite cryptocurrency:

Every contribution, no matter how small, makes a big difference. Thank you!

tugarecon


Final note

This README has been updated to match the current behavior of tugarecon.py (flags/usage) and to resolve the license inconsistency. If you prefer the MIT license instead of GPLv3, tell me and I can update the source file headers or switch the README to reflect MIT licensing.