██████ ██████ ███████
██ ██ ██ ██ ██
██████ ██████ ███████
██ ██ ██ ██ ██
██████ ██ ██ ███████
project: brabus recon suite (brs) | company: easyprotech llc (www.easypro.tech)
Network Reconnaissance & Penetration Testing Toolkit
Professional Network Reconnaissance & Penetration Testing Toolkit
Company: EasyProTech LLC (www.easypro.tech)
Developer: Brabus
Created: Mon 22 Jul 2025 03:06:28
Version: 2.1
Updated: Sun 11 Aug 2025 01:20:17
Telegram: https://t.me/easyprotech
Advanced suite of tools for network reconnaissance, domain analysis, vulnerability assessment and penetration testing with enhanced user experience and professional-grade interface.
Related Module: BRS-XSS — Next-Generation XSS Detection Suite. Standalone Python CLI for context-aware XSS scanning (HTML/JS context analysis, WAF detection/bypass heuristics, DOM analysis via Playwright, ML-ready scoring) with HTML/JSON/SARIF reports and easy integration into BRS results workflow.
- Quick Start: Full Scan (auto) at launch
- Enter → full local scan (System Info → Port Scan Aggressive → Vulnerability Comprehensive)
- IP/Domain → full remote scan (+ Domain Recon for domains)
- Centralized tool checks; removed inline installs from modules
- i18n loading unified (
CURRENT_LANGUAGE="en"); localized menu labels - Network Discovery: non-interactive
LOCAL_NETsupport; stability fixes - Domain Recon: robust total-time calculation in comprehensive mode
- Domain Reconnaissance Module - Comprehensive domain analysis capabilities
- Professional Interface - Clean, emoji-free menus for serious professionals
- Advanced Progress Indicators - Live timers and cancellation support
- Enhanced System Information - Detailed hardware, network, and security reporting
- Improved Error Handling - Robust interrupt handling and cleanup procedures
- Streamlined Architecture - Optimized code structure and performance
- Unified Spinner System - Consistent progress indication across all modules
- Professional Menu Design - Removed emojis from menu items for business use
- Better Resource Management - Enhanced cleanup and signal handling
- Optimized Performance - Reduced redundancy and improved speed
- Enhanced Documentation - Complete feature coverage and usage examples
- Language Support: English-only during v2.0 stabilization (
CURRENT_LANGUAGE="en") - Legacy Compatibility: V1.0 language packs are excluded for now
- Future Roadmap: Multi-language support will be restored in future releases
THIS IS A PENETRATION TESTING TOOLKIT FOR AUTHORIZED SECURITY TESTING ONLY
Using this software to scan, probe, or attack networks, systems, or services that you do not own or have explicit written permission to test is ILLEGAL and may result in:
- Criminal charges and prosecution under computer crime laws
- Substantial fines (potentially millions of dollars)
- Prison time (multiple years depending on severity)
- Permanent criminal record
- Civil lawsuits for damages and legal costs
AUTHORIZED USE ONLY:
- Your own networks and systems
- With explicit written authorization from system owners
- Within scope of authorized penetration testing contracts
- As part of legitimate bug bounty programs
- In controlled educational environments
git clone https://github.com/EasyProTech/brs.git && cd brs && ./main.sh# Clone or extract the project to any directory
cd brs
./main.shAll paths are automatically resolved relative to the project location.
Comprehensive local network reconnaissance
Features:
- Automatic network interface detection
- Intelligent network range identification
- Multi-method host discovery (ping sweep, ARP scan)
- Fast port scanning of discovered hosts
- MAC address vendor identification
- Detailed network topology mapping
- Professional progress indicators with live timers
Improvements in v2.0:
- Enhanced host detection algorithms
- Better network interface handling
- Improved scan performance
- Professional progress visualization
Advanced port scanning capabilities
Scanning Modes:
- Fast Scan - Top 1000 ports for quick reconnaissance
- Full Scan - Complete 65535 port range analysis
- Stealth SYN Scan - Covert reconnaissance techniques
- UDP Scanning - UDP service discovery
- Service Version Detection - Application fingerprinting
- Aggressive Scanning - OS detection and script scanning
- Tor Scanning - Anonymous scanning through Tor network
- Mass Scanning - High-speed scanning with masscan
- Batch Operations - Scan all discovered hosts automatically
v2.0 Enhancements:
- Unified progress indication system
- Better timeout handling
- Enhanced result formatting
- Professional interface design
Comprehensive domain intelligence gathering
Core Capabilities:
- Basic Domain Information - DNS records and infrastructure analysis
- DNS Records Enumeration - Complete DNS record discovery (A, AAAA, MX, NS, TXT, etc.)
- Subdomain Discovery - Advanced subdomain enumeration techniques
- Email Harvesting - Email address discovery from various sources
- Zone Transfer Testing - DNS zone transfer vulnerability assessment
- Certificate Transparency - SSL certificate log analysis
- WHOIS Information - Domain registration and ownership data
- Web Technology Detection - Technology stack identification
- Social Media Discovery - Social media presence analysis
- Comprehensive Domain Scan - All-in-one domain assessment
Technical Features:
- Certificate transparency log integration
- Advanced subdomain discovery algorithms
- Email pattern recognition
- Technology fingerprinting
- Professional progress indicators
Professional security vulnerability detection
Assessment Types:
- NSE Nmap Scripts - Advanced vulnerability detection scripts
- Web Vulnerability Scanning - Nikto-based web application testing
- SQL Injection Testing - SQLmap integration for database security
- SMB Vulnerability Scanning - Windows network service testing
- SSH Security Testing - SSH configuration and credential testing
- FTP Security Assessment - FTP service vulnerability analysis
- Telnet Security Testing - Legacy protocol security assessment
- Network Shares Discovery - SMB/NFS share enumeration
- SSL/TLS Analysis - Cryptographic protocol assessment
- Comprehensive Scanning - Automated multi-vector testing
- Automated Host Assessment - Batch vulnerability testing
v2.0 Improvements:
- Enhanced vulnerability detection algorithms
- Better result categorization
- Professional progress tracking
- Improved error handling
Comprehensive system reconnaissance and analysis
Information Categories:
- Full System Report - Complete system analysis with executive summary
- System Information - OS, kernel, architecture, hostname, uptime details
- Hardware Information - CPU, memory, storage analysis
- Network Configuration - Interface details, routing tables, active connections
- Security Status - Firewall status, user activity, authentication logs
- Running Services - Service status analysis and monitoring
- Connected Devices - USB, PCI, WiFi, Bluetooth device enumeration
v2.0 Features:
- Professional progress indicators for long operations
- Enhanced data collection algorithms
- Better categorization and formatting
- Timestamped result files
- Executive summary generation
Professional penetration testing capabilities
Attack Categories:
- Credential Attacks - SSH, FTP, HTTP, Telnet, RDP brute force
- Network Attacks - DoS attacks, ARP spoofing, MITM operations
- Web Application Attacks - Directory brute forcing, web-based attacks
- Wireless Attacks - WiFi security assessment and handshake capture
- Custom Wordlists - Flexible credential dictionary support
v2.0 Enhancements:
- Professional progress tracking
- Better attack success reporting
- Enhanced logging and documentation
- Improved safety measures
- nmap - Network mapping and port scanning
- masscan - High-speed port scanning
- hydra - Network authentication cracking
- nikto - Web server vulnerability scanner
- sqlmap - SQL injection testing tool
- dig - DNS lookup utility
- whois - Domain registration lookup
- curl - HTTP/HTTPS client for web requests
- jq - JSON processing for API responses
- john - Password cracking utilities
- ettercap - Network security toolkit
- aircrack-ng - WiFi security auditing
- Ubuntu 22.04+ or compatible Linux distribution
- Sudo privileges for advanced scanning techniques
- Minimum 4GB RAM for optimal performance
- 5GB free disk space for results and wordlists
- Network interfaces for wireless testing (optional)
All scan results are automatically saved with timestamps:
results/
├── 20250722-030628_network_scan.txt
├── 20250722-030645_domain_recon_example.com.txt
├── 20250722-030702_vuln_scan_192.168.1.100.txt
├── 20250722-030715_system_info.txt
└── 20250722-030730_port_scan_192.168.1.0-24.txt
File Naming Convention:
YYYYMMDD-HHMMSS_operation_target.txt- Automatic result categorization
- Timestamped for audit trails
- Professional formatting for reporting
The system currently operates in English-only mode (config CURRENT_LANGUAGE="en"). Multi-language packs from v1.0 are excluded during v2.0 stabilization and may return later.
- Consistent progress indication
- Professional color schemes
- Business-appropriate formatting
Note: During v2.0 development the console UI may include minimal emoji icons in status messages; the final business preset can disable them.
./main.sh
# 1) Network Discovery -> Discover all network hosts
# 2) Port Scanning -> 9) Scan all discovered hosts
# 4) Vulnerability Search -> 11) Auto-scan all hosts
# 7) Results -> Review comprehensive findings./main.sh
# 3) Domain Reconnaissance
# 10) Comprehensive Domain Scan
# Enter target domain: example.com./main.sh
# 5) System Information
# 1) Full System Report -> Complete system analysis./main.sh
# 4) Vulnerability Search
# 10) Comprehensive vulnerability scanning
# Review results in timestamped files# Network discovery and mapping
./main.sh → 1) Network Discovery
# Domain intelligence gathering
./main.sh → 3) Domain Reconnaissance# Comprehensive port analysis
./main.sh → 2) Port Scanning → 9) Scan all hosts
# System information gathering
./main.sh → 5) System Information → 1) Full Report# Vulnerability identification
./main.sh → 4) Vulnerability Search → 10) Comprehensive
# Security configuration analysis# Controlled penetration testing
./main.sh → 6) Attack Tools → Select appropriate tests# Results compilation and analysis
./main.sh → 7) Results → Review all findings- Live Timers - Real-time operation duration tracking
- Cancellation Support - Ctrl+C handling with proper cleanup
- Professional Animation - Unicode spinner indicators
- Operation Status - Clear completion messaging
- Clean Menus - Emoji-free, business-appropriate design
- Consistent Formatting - Standardized output across modules
- Color Coding - Professional color schemes for different message types
- Structured Output - Organized, readable result presentation
- Graceful Interruption - Proper signal handling
- Resource Cleanup - Automatic temporary file management
- Error Recovery - Robust handling of unexpected conditions
- Logging Integration - Comprehensive error documentation
Permission Issues:
chmod +x main.sh scripts/*.shMissing Dependencies:
./main.sh → 8) Settings → 2) Check ToolsNetwork Access Issues:
- Verify network connectivity
- Check firewall settings
- Ensure proper interface configuration
Performance Issues:
- Increase system resources
- Reduce scanning parallelism
- Use targeted scanning instead of broad sweeps
- Nmap Documentation
- Domain Reconnaissance Techniques
- Vulnerability Assessment Methodologies
- Professional Penetration Testing Standards
- Quick Start Full Scan
- Centralized tooling & i18n fixes
- Stability improvements in discovery and recon
- Domain Reconnaissance Module - Complete domain analysis capabilities
- Professional Interface - Business-appropriate menu design
- Enhanced Progress System - Live timers and cancellation support
- Improved System Analysis - Comprehensive system information gathering
- Streamlined Development - English-only mode for development phase
- Basic network reconnaissance
- Multi-language support (7 languages)
- Core vulnerability scanning
- Basic attack tools
- Foundation architecture
🚨 CRITICAL: READ CAREFULLY BEFORE USE
BY USING THIS SOFTWARE, YOU AGREE TO BE LEGALLY BOUND BY ALL TERMS.
AUTHORIZED USE REQUIREMENTS:
- Explicit written authorization for target systems
- Professional penetration testing contracts
- Authorized security research activities
- Educational use in controlled environments
- Bug bounty programs within scope
STRICTLY PROHIBITED:
- Unauthorized network scanning or testing
- Attacks on systems without permission
- Malicious or illegal activities
- Violation of applicable laws and regulations
LEGAL CONSEQUENCES: Unauthorized use may result in prosecution under computer crime laws worldwide, including substantial fines and imprisonment.
COMPLETE LIABILITY DISCLAIMER: EasyProTech LLC provides this software "AS IS" with NO WARRANTY and accepts NO RESPONSIBILITY for misuse, damage, or legal consequences.
YOU BEAR FULL RESPONSIBILITY FOR YOUR ACTIONS.
No Support Provided: This project is released as-is without support, consultation, or assistance.
Community Contributions: Development contributions are welcome but not obligated.
DUAL LICENSE STRUCTURE
- Educational, research, and open-source projects
- Copyleft compliance required
- Commercial entities and proprietary projects
- Contact: @easyprotech (Telegram)
See LICENSE file for complete terms.
Brabus Recon Suite v2.1 | EasyProTech LLC | Lead Developer: brabus | @easyprotech
Professional Network Reconnaissance for Authorized Security Testing