Recon is one of the most important phases that seem easy but takes a lot of effort and skill to do right. One needs to know about the right tools, correct queries/syntax, run those queries, correlate the information, and sanitize the output. All of this might be easy for a seasoned infosec/recon professional to do, but for rest, it is still near to magic. How cool it will be to ask a simple question like “Find me an open Memcached server in Singapore with UDP support?” or “How many IP cameras in Singapore are using default credentials?” in a chat and get the answer?
The integration of GPT-3, deep learning-based language models to produce human-like text, with well-known recon tools like Shodan, is the foundation of ReconPal. ReconPal also supports using voice commands to execute popular exploits and perform reconnaissance.
- OpenAI GPT-3
- Shodan API
- Telegram Bot
- Docker Containers
- Python 3
To get ReconPal up and running, follow these simple steps.
Clone the repo
git clone https://github.com/pentesteracademy/reconpal.git
Enter your OPENAI, SHODAN API keys, and TELEGRAM bot token in
<div class="highlight highlight-source-yaml notranslate position-relative overflow-auto" data-snippet-clipboard-copy-content="OPENAI_API_KEY= SHODAN_API_KEY= TELEGRAM_BOT_TOKEN=”>