๐ ThreatTape Recon
Automated Reconnaissance. Professional Reports.
Enterprise-grade automated recon and OSINT platform built for penetration testers and security teams. From domain enumeration through executive profiling, CVE mapping, and compliance-ready report generation โ all in one containerized platform with optional TOR-anonymous scanning.
Core Capabilities
Technical Infrastructure Recon
Automated domain and subdomain discovery using amass and subfinder. Port scanning with nmap, service fingerprinting, and version detection with confidence scoring. Maps the full external attack surface before an adversary does.
CVE Mapping & Vulnerability ID
Nuclei-powered vulnerability scanning correlates discovered services against current CVE databases. CVSS scores, remediation priority, and evidence capture โ all structured for reporting. Know what's exploitable, not just what's open.
Executive OSINT
Person-first reconnaissance with company identification. Social media footprint analysis via Sherlock, email discovery via Hunter.io, data breach exposure via HaveIBeenPwned and LeakCheck. Build the target profile that attackers already have.
TOR Anonymous Scanning
Five rotating TOR proxy instances for low-attribution recon. Configurable anonymity level per scan โ run stealth assessments without exposing your infrastructure. Scan from the outside the way real adversaries do.
Professional Report Generation
Multi-format output: PDF, HTML, JSON, CSV, XML. SOC 2 and ISO 27001 compliance templates built in. Executive summary and technical detail layers. Full chain of custody tracking for legal admissibility.
Real-Time Scan Progress
WebSocket-based live updates stream asset discoveries and vulnerability findings as they happen. Up to 50 concurrent scans via Celery workers. Watch the surface area grow in real time.
Scan Profiles
Four profiles balance speed against depth. TOR-enabled scans run 2โ3x longer to maintain anonymity.
OSINT & Threat Intel Integrations
Recon pulls from the same data sources threat actors use. No proprietary sensors โ just the intelligence the open web already has on your targets.
Technology Stack
Fully containerized multi-service architecture. Each layer scales independently โ scanning workers, API backend, and UI are separate containers with isolated networks.
Minimum specs: 8 cores ยท 32 GB RAM ยท 500 GB SSD | Recommended production: 16 cores ยท 64 GB ECC RAM ยท 2 TB NVMe ยท 10 Gbps
Recon Like the Adversary Does
ThreatTape Recon is in active early development. We're building it for our own engagements first โ so it has to work in the real world, not just in demos. If you want early access when we open testing, get on the list.