Raccoon is an offensive security tool designed for reconnaissance and information gathering, featuring DNS details, visual mapping, WHOIS information, TLS data, port scanning, URL fuzzing, subdomain enumeration, web application data retrieval, cookie inspection, email address extraction, S3 bucket vulnerability scanning, WAF detection, Tor/proxy routing, and more. It supports asyncio for improved performance, saves output to files, and has a roadmap for future enhancements such as OWASP branch integration, additional storage scan providers, WAF support, multiple hosts, rate limit evasion, IP ranges, CIDR notation, and various output formats.
Common questions about Raccoon including features, pricing, alternatives, and user reviews.
Raccoon is Offensive security tool for reconnaissance and information gathering with a wide range of features and future roadmap. It is a Security Operations solution designed to help security teams with Port Scanning, Reconnaissance, Subdomain Enumeration.
Raccoon is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/evyatarmeged/Raccoon/ for download and installation instructions.
Popular alternatives to Raccoon include:
Compare all Raccoon alternatives at https://cybersectools.com/alternatives/raccoon
Raccoon is for security teams and organizations that need Port Scanning, Reconnaissance, Subdomain Enumeration. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
DNS reconnaissance tool checking DNS records, subdomains, and third-party svcs
An open-source framework that enables building and deploying AI security tools
GraphSpy is a browser-based post-exploitation tool for Azure Active Directory and Office 365 environments that enables token management, reconnaissance, and interaction with Microsoft 365 services.
LinksDumper extracts links and endpoints from HTTP responses to support web application security testing and reconnaissance activities.
A collection of Python scripts for password spraying attacks against Lync/S4B & OWA, featuring Atomizer, Vaporizer, Aerosol, and Spindrift tools.