Recon suites review
What? This is a December 2020 hunting/pentesting recon suites review made by myself. I have compared and review every tool one by one and obtained a general view of the "state-of-the-art" of the most used recon tools.
Why? Lately there has been an explosion in the creation of these types of tools, and I was simply curious about how each one faced the challenge of profiling one or more objectives.
How? First, I have analyzed what features the suites have and then what tools they used to achieve those functionalities.
From my POV a recon tool should get as much information as possible from a target regardless of its size. From subdomains enumeration to analyze all JS and their possible secrets, through SSL failures or consult information in public sources. Neither am I looking for a tool that will get all the low-hanging fruit for P1 automatically continuously, let's be honest, most people are looking for this, and you don't have the necessary to set up a competent infrastructure to achieve it.
I thought about making measurements on the number of subdomains that each tool retrieves and the number of information that they retrieve in general, but this poses several problems. In the end, these suites launch existing subdomain enumeration tools, so I'll do that other day (spoiler! 😲) and it doesn't really depend on the suite itself. On the other hand, each tool does different processes with different tools, so it would not be fair (or measurable, I think) to make a comparison of the quantity or quality of information they obtain.
My perfect recon suite should be able to do the following: run a command, review its contents, and then run another tool with that information, like "subdomain enum | httpx | gf | dalfox". Yeah I know, it's a simple oneliner, but also, I want a lot of different checks in an easy readable and organized way. Easy? Let's see.
This is not intended to be a serious investigation, a technical paper, or anything like that, just a series of tests that I have done for fun. The results shown are my opinion and if at any time you don't like them, or you don't agree, you can stop reading or explain to me how I could have done it better 😉
All the results of my runs and tests are posted here, it has three sheets (Summary, features and tools).
Small summary of each tool with the features and results that I got. This section not follows any special order.

- Language: Bash
It's composed of a lot of simple bash scripts that are calling each other which makes it much easier to add some changes that fit for you or what you want or add your own.
- Superb workflow.
- Easy to understand and adapt for your needs.
- Best and trendy tools like nuclei, dalfox or gf patterns.
- Scope defined workflows.
- No web screenshots.
- Lack of output customization.

- Language: Python2
This tool continues the process of the author's tool 3klector and have a strong workflow which covers a lot of things.
- ASN and acquisitions collector.
- Provides Dorks to check manually.
- Python2 died a year ago, too much for a live project imho.
- No subdomain bruteforce.
- No web screenshots.

- Language: Python3
I have been using this tool for a lot of time, It does a very good job of enumerating subdomains giving complete results.
- Uses Shodan for fast port scan.
- Vhosts checker.
- Wordlist generator from target.
- Slack notifications.
- Needs API keys.
- No vulns scanner.
- No endpoints checks like xss, params, js, etc.

- Language: Python3
One of the well known, in a short time it has become one of the best known, now its author is evolving this project in huntersuite.io (paid).
- Web interface.
- Nice report output.
- Slack notifications.
- ffuf for fuzzing.
- No WAF checker
- Jaeles for vulns scan feels buggy.
- No endpoints analysis like potential xss, params, js, etc.

- Language: Python3
Recently added to the official Kali repositories, increasingly known and used. Mainly focused on web scan, but it does the recon phase too.
- Very good cli output.
- Customizable files output.
- Not use external tools, does almost everything by its own.
- Need API keys.
- Only passive subdomain enumeration.
- Lack of features surprisingly.

- Language: Python3
A tool driven by a web interface (only) with a good integration of the best tools such as amass, nuclei or dirsearch.
- Web interface.
- Customizable files output.
- Schedule feature and dashboard.
- Exclude subdomains feature.
- No cli output.
- No subdomains permutations or bruteforce.
- Displaying directory enumeration in web interface is not good at all.