Skip to content
Related Articles

Related Articles

ReconCobra – Software for Information Gathering

Improve Article
Save Article
Like Article
  • Last Updated : 10 Oct, 2021

Every Ethical Hacker needs an automated tool that performs all the Recon and Scanning processes in the same tool, but it is hard to get that tool. The ReconCobra tool is no doubt an all-in-one tool for Recon and Scanning. This tool performs almost every single Recon step on the target domain. ReconCobra tool contains almost 82 different recon options from which valuable information about the target domain can be collected.ReconCobra tool is developed in the Perl Language, and it’s available on the GitHub platform. ReconCobra tool is free and open-source to use. ReconCobra tool performs username enumeration, files, endpoints, API discovery along with this Port Scanning, Subdomain Enumeration, and many more.

Installation of ReconCobra Tool on Kali Linux OS

Step 1: Use the following command to install the tool in your Kali Linux operating system.

git clone

Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.

cd ReconCobra

Step 3: Change the permissions of all .sh file by using the following command.

sudo chmod u+x *.sh

Step 4: Run the below command to verify the installation.


Step 5: Launching the tool by using the following command.


Working with ReconCobra Tool on Kali Linux OS

Example 1: Recommended Port Scan 

Select Option 4

In this example, we are performing port scanning on the target domain

We have entered the domain host-name.

We have got the list of ports along with their state and service.

Example 2: Reverse IP Lookup

Select Option 8

In this example, we are performing a Reverse IP Lookup on

We have got the Reverse IP Lookup results on the target domain.

Example 3: Find Directories from robots.txt 

Select Option 44

In this example, we are searching for directories from the robots.txt file.

We have got some results, which will be displayed on the web browser.

We have got the dork result, which contains the exact robots.txt file.

The contents of robots.txt file are displayed in the below screenshot.

My Personal Notes arrow_drop_up
Recommended Articles
Page :

Start Your Coding Journey Now!