MinRecon is a super-lightweight, Bash-based reconnaissance tool built for ethical hackers, penetration testers, and bug bounty hunters working with limited resources. Created by Inayat Hussain, this script is optimized for systems with as little as 4GB RAM, such as low-end laptops or virtual machines.
In modern bug bounty workflows, recon is the foundation. But not everyone has access to high-end machines or powerful VPS setups. MinRecon was designed for:
- β¨ Beginners starting recon with basic hardware
- π» Low-resource environments (bare metal, VMs, Replit)
- π Quick one-shot recon tasks
- π§ Domain input and one-click recon
- π Subdomain enumeration
- π HTTP probing (check live hosts)
- π‘οΈ Port scanning (optional)
- π‘ Highly optimized for speed and size
- π§ Beginner-friendly and fully modular
MinRecon is written in pure Bash and uses a few essential CLI tools:
curldigpingwhoisnslookuphostnmap(optional)
π All tools come pre-installed in most Parrot OS/Kali/Ubuntu distros.
chmod +x minrecon.sh
./minrecon.sh
π₯οΈ How to Use
Run the script:
./minrecon.sh
Enter your target domain (e.g. example.com)
Let the script perform:
DNS information lookup
Subdomain gathering (basic)
Live host detection
Whois and IP info
Optional nmap scan
Results will be printed in terminal and saved in:
π€ Author
Built with care by Inayat Hussain (Inayat Raj Chohan)
π§ Facebook: Inayat Raj Chohan
β οΈ Disclaimer
This tool is for educational and authorized penetration testing only. Use responsibly and only on assets you have permission to test.
π Support
If you find this tool helpful, please star the repo and share with fellow hackers. Every bit of encouragement helps in my journey as a self-taught cybersecurity professional with limited resources.
---
## πΈ GitHub Short Description
When creating the repo, use this in the "Description" field:
> Lightweight domain recon tool for ethical hackers and bug bounty hunters with low-end set