A high-performance offensive security tool for reconnaissance, vulnerability scanning, and information gathering.
Raccoon is a high-performance offensive security tool designed for reconnaissance and vulnerability scanning. It automates information gathering tasks such as DNS analysis, WHOIS lookups, TLS data extraction, port scanning, subdomain enumeration, and web application reconnaissance to help identify security weaknesses.
Security professionals, penetration testers, ethical hackers, and red teamers who need an efficient tool for comprehensive reconnaissance and initial vulnerability assessment during security audits.
Developers choose Raccoon for its simplicity, asynchronous performance, and comprehensive feature set that covers a wide range of reconnaissance tasks in a single tool, with support for anonymous routing via Tor/proxies and structured output organization.
A high performance offensive security tool for reconnaissance and vulnerability scanning
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Uses Python's asyncio to run independent scans concurrently, maximizing efficiency as stated in the Philosophy, reducing total runtime for comprehensive reconnaissance.
Integrates DNS, WHOIS, TLS analysis, port scanning with Nmap, and web app reconnaissance into a single tool, automating a wide range of tasks from the Key Features list.
Supports anonymous routing through Tor and proxy lists, enabling stealthy operations for ethical hacking, as highlighted in the Features and Usage sections.
Saves results in organized folders per target and files per module, making it easy to review and analyze scan data, as demonstrated in the Screenshots.
Requires separate installation of Nmap and OpenSSL, adding complexity to setup compared to self-contained tools, as noted in the Prerequisites section.
Currently lacks JSON output, which is on the roadmap, hindering easy data parsing and integration with other security tools for automated workflows.
Using Tor or proxies significantly slows down scans, as admitted in the Usage options with warnings like 'Slows total runtime', impacting time-sensitive operations.