Wp Header Logo 103

ReconPal – Leveraging NLP For Infosec

Recon is one of the most important phases that seem easy but takes a lot of effort and skill to do right. One needs to know about the right tools, correct queries/syntax, run those queries, correlate the information, and sanitize the output. All of this might be easy for a seasoned infosec/recon professional to do, but for rest, it is still near to magic. How cool it will be to ask a simple question like “Find me an open Memcached server in Singapore with UDP support?” or “How many IP cameras in Singapore are using default credentials?” in a chat and get the answer?

To get ReconPal up and running, follow these simple steps.


Clone the repo

Enter your OPENAI, SHODAN API keys, and TELEGRAM bot token in docker-compose.yml

Start reconpal

Open the telegram app and select the created bot to use ReconPal.

Sarthak Saini (Ex-Pentester Academy)

For more details, refer to the “ReconPal.pdf” PDF file. This file contains the slide deck used for presentations.

Starting reconpal and registering model

Finder module in action

Scanner module in action

Attacker module in action

Voice Support

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License v2 as published by the Free Software Foundation.


Leave a Comment

Leave a Reply

Your email address will not be published.

Dahua IP Camera Vulnerability Could Let Attackers Take Full Control Over Devices

pyFlipper – Unoffical Flipper Zero Cli Wrapper Written In Python

Hackers Compromise Employee Accounts to Access Twilio Internal Systems

RPCMon – RPC Monitor Tool Based On Event Tracing For Windows