Recon by danielmiessler/personal_ai_infrastructure
npx skills add https://github.com/danielmiessler/personal_ai_infrastructure --skill Recon在执行前,请检查用户自定义配置位于: ~/.claude/PAI/USER/SKILLCUSTOMIZATIONS/Recon/
如果此目录存在,则加载并应用其中找到的任何 PREFERENCES.md、配置或资源。这些将覆盖默认行为。如果目录不存在,则使用技能默认设置。
基础设施与网络侦察
当调用此技能时,在进行任何其他操作之前,您必须发送此通知。
发送语音通知:
curl -s -X POST http://localhost:8888/notify
-H "Content-Type: application/json"
-d '{"message": "Running the WORKFLOWNAME workflow in the Recon skill to ACTION"}'
> /dev/null 2>&1 &
输出文本通知:
Running the WorkflowName workflow in the Recon skill to ACTION...
这不是可选的。在技能调用时立即执行此 curl 命令。
对网络基础设施(包括域名、IP地址、网络块和ASN)进行技术侦察。结合被动情报收集与授权的主动扫描,以绘制攻击面并识别资产。
核心触发条件 - 当用户说以下内容时使用此技能:
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
OSINT → recon(常见模式):
recon → webassessment:
工作流集成:
// OSINT skill discovers company infrastructure
const domains = await osintFindCompanyDomains("Acme Corp");
// Calls recon skill to map technical details
const infraMap = await reconDomain(domains[0]);
// Recon identifies web apps
const webApps = infraMap.subdomains.filter(s => s.hasHTTP);
// Calls web assessment for testing
await webAssessment(webApps);
关键授权要求:
主动侦察必须满足:
默认行为是仅被动侦察。 在使用主动技术前始终进行确认。
PassiveRecon.md - 安全侦察使用公共源进行非侵入式情报收集:
输入: 域名、IP 或网络块 输出: 被动情报报告 授权: 无需
IpRecon.md - IP地址调查全面的IP地址侦察:
输入: 单个IP地址 输出: IP侦察报告 授权: 主动扫描需要授权
DomainRecon.md - 域名调查完整的域名映射和枚举:
输入: 域名 输出: 域名侦察报告 授权: 主动子域名探测需要授权
NetblockRecon.md - CIDR范围扫描网络范围侦察:
输入: CIDR 表示法(例如,192.168.1.0/24) 输出: 网络块扫描报告 授权: 主动扫描需要授权
ASN 和 BGP 侦察(使用 WHOIS、IPInfo 和公共 BGP 数据内联执行):
输入: ASN 编号(例如,AS15169) 输出: ASN 映射报告 授权: 无需(被动数据)
IPInfo API (ipinfo.io)
process.env.IPINFO_API_KEYTools/IpinfoClient.ts系统工具(始终可用)
whois - 域名和IP WHOIS查询dig - DNS查询nslookup - DNS解析curl - HTTP请求、API调用MCP 工具(需要安全配置文件)
httpx - HTTP探测和技术检测naabu - 端口扫描~/.claude/MCPs/swap-mcp security)Shodan(添加API密钥时)
Censys(添加API密钥时)
SecurityTrails(添加API密钥时)
VirusTotal(添加API密钥时)
位于 Tools/ 目录:
IpinfoClient.ts
DnsUtils.ts
WhoisParser.ts
CidrUtils.ts
# IP Reconnaissance: 1.2.3.4
## Summary
- IP: 1.2.3.4
- Organization: Example Corp
- ASN: AS12345
- Location: San Francisco, CA, US
- ISP: Example Hosting
## DNS
- Reverse DNS: server.example.com
- Additional PTR: ...
## Network Information
- CIDR: 1.2.3.0/24
- Netblock Owner: Example Corp
- Abuse Contact: abuse@example.com
## Services (Passive)
- Certificates: 3 certificates found
- Historical DNS: ...
## Services (Active - Authorized)
- Open Ports: 22, 80, 443
- Services: SSH (OpenSSH 8.2), HTTP (nginx 1.20.1), HTTPS
- Technologies: nginx, OpenSSH
## Recommendations
- Further investigation areas
- Related assets
- Security observations
# Domain Reconnaissance: example.com
## Summary
- Domain: example.com
- Registrar: Example Registrar
- Registration: 2010-01-15
- Expiry: 2026-01-15
## DNS Records
### A Records
- 1.2.3.4
- 5.6.7.8
### MX Records
- 10 mail.example.com
## Subdomains
- www.example.com (1.2.3.4)
- api.example.com (1.2.3.5)
- admin.example.com (1.2.3.6)
## Email Security
- SPF: Configured
- DMARC: Configured
- DKIM: Configured
## Technologies
- Web Server: nginx
- Framework: React
- CDN: Cloudflare
## Recommendations
- Interesting subdomains: admin.example.com, api.example.com
- Attack surface: 15 web applications identified
报告保存至:
~/.claude/MEMORY/WORK/{current_work}/) - 用于调查期间的迭代产物~/.claude/MEMORY/RESEARCH/YYYY-MM/) - 用于渗透测试任务和正式评估对于被动侦察: 无需特殊 MCP 配置文件
对于主动侦察: 需要安全 MCP 配置文件
# Switch to security profile
~/.claude/MCPs/swap-mcp security
# Restart Claude Code to apply
# Then run active reconnaissance
安全配置文件包括:
关键规则:
授权类型:
绝不扫描:
如有疑问: 请求明确确认和有记录的授权。
User: "Do passive recon on example.com"
Assistant: Activating recon skill with passive-recon workflow.
Target: example.com
Mode: Passive only (no active scanning)
[Performs WHOIS, DNS, cert transparency, IPInfo]
[Generates report in scratchpad]
Report: ~/.claude/MEMORY/WORK/{current_work}/recon-example-com/
User: "Investigate IP 1.2.3.4 - I own this server"
Assistant: Activating recon skill with ip-recon workflow.
Target: 1.2.3.4
Authorization check: You confirmed this is an owned asset.
Proceeding with passive + active reconnaissance.
[Performs IPInfo, reverse DNS, WHOIS, port scan, service detection]
[Generates comprehensive report]
Report: Open ports found (22, 80, 443)
Services: SSH, HTTP, HTTPS
Technologies: nginx 1.20.1, OpenSSH 8.2
User: "Do OSINT on Acme Corp and map their infrastructure"
Assistant: Activating OSINT skill...
Found domains: acme.com, acmecorp.com, acme.io
Now calling recon for infrastructure mapping...
[Recon skill maps each domain]
[Discovers subdomains, IPs, netblocks]
[Creates comprehensive infrastructure map]
Report: Complete OSINT + Infrastructure report
15 domains, 47 subdomains, 3 netblocks identified
基于输入的自动工作流选择:
IpRecon.mdDomainRecon.mdNetblockRecon.mdPassiveRecon.md用户可以覆盖:
"Use passive-recon workflow on 1.2.3.4"
"Run domain-recon on example.com with active scanning"
被动侦察成功:
主动侦察成功:
安全技能:
~/.claude/skills/Investigation/ - 实体和人员侦察 (OSINT)~/.claude/skills/Security/WebAssessment/ - Web应用程序测试工具文档:
最佳实践:
记住: 从被动开始,在转为主动前确认授权,记录一切,并尊重目标系统。
每周安装数
73
仓库
GitHub Stars
10.5K
首次出现
Jan 24, 2026
安全审计
安装于
codex62
gemini-cli61
opencode61
github-copilot57
claude-code55
cursor54
Before executing, check for user customizations at: ~/.claude/PAI/USER/SKILLCUSTOMIZATIONS/Recon/
If this directory exists, load and apply any PREFERENCES.md, configurations, or resources found there. These override default behavior. If the directory does not exist, proceed with skill defaults.
Infrastructure and Network Reconnaissance
You MUST send this notification BEFORE doing anything else when this skill is invoked.
Send voice notification :
curl -s -X POST http://localhost:8888/notify \
-H "Content-Type: application/json" \
-d '{"message": "Running the WORKFLOWNAME workflow in the Recon skill to ACTION"}' \
> /dev/null 2>&1 &
Output text notification :
Running the **WorkflowName** workflow in the **Recon** skill to ACTION...
This is not optional. Execute this curl command immediately upon skill invocation.
Technical reconnaissance of network infrastructure including domains, IP addresses, netblocks, and ASNs. Combines passive intelligence gathering with authorized active scanning to map attack surfaces and identify assets.
Core Triggers - Use this skill when user says:
OSINT → recon (Common Pattern):
recon → webassessment:
Workflow Integration:
// OSINT skill discovers company infrastructure
const domains = await osintFindCompanyDomains("Acme Corp");
// Calls recon skill to map technical details
const infraMap = await reconDomain(domains[0]);
// Recon identifies web apps
const webApps = infraMap.subdomains.filter(s => s.hasHTTP);
// Calls web assessment for testing
await webAssessment(webApps);
CRITICAL AUTHORIZATION REQUIREMENTS:
Active reconnaissance MUST have:
Default behavior is PASSIVE ONLY. Always confirm before active techniques.
PassiveRecon.md - Safe ReconnaissanceNon-intrusive intelligence gathering using public sources:
Input: Domain, IP, or netblock Output: Passive intelligence report Authorization: None required
IpRecon.md - IP Address InvestigationComprehensive IP address reconnaissance:
Input: Single IP address Output: IP reconnaissance report Authorization: Required for active scanning
DomainRecon.md - Domain InvestigationFull domain mapping and enumeration:
Input: Domain name Output: Domain reconnaissance report Authorization: Required for active subdomain probing
NetblockRecon.md - CIDR Range ScanningNetwork range reconnaissance:
Input: CIDR notation (e.g., 192.168.1.0/24) Output: Netblock scan report Authorization: Required for active scanning
ASN and BGP reconnaissance (performed inline using WHOIS, IPInfo, and public BGP data):
Input: ASN number (e.g., AS15169) Output: ASN mapping report Authorization: None required (passive data)
IPInfo API (ipinfo.io)
process.env.IPINFO_API_KEYTools/IpinfoClient.tsSystem Tools (always available)
whois - Domain and IP WHOIS lookupsdig - DNS queriesnslookup - DNS resolutioncurl - HTTP requests, API callsMCP Tools (security profile required)
httpx - HTTP probing and technology detectionnaabu - Port scanning~/.claude/MCPs/swap-mcp security)Shodan (when API key added)
Censys (when API key added)
SecurityTrails (when API key added)
VirusTotal (when API key added)
Located in Tools/ directory:
IpinfoClient.ts
DnsUtils.ts
WhoisParser.ts
CidrUtils.ts
# IP Reconnaissance: 1.2.3.4
## Summary
- IP: 1.2.3.4
- Organization: Example Corp
- ASN: AS12345
- Location: San Francisco, CA, US
- ISP: Example Hosting
## DNS
- Reverse DNS: server.example.com
- Additional PTR: ...
## Network Information
- CIDR: 1.2.3.0/24
- Netblock Owner: Example Corp
- Abuse Contact: abuse@example.com
## Services (Passive)
- Certificates: 3 certificates found
- Historical DNS: ...
## Services (Active - Authorized)
- Open Ports: 22, 80, 443
- Services: SSH (OpenSSH 8.2), HTTP (nginx 1.20.1), HTTPS
- Technologies: nginx, OpenSSH
## Recommendations
- Further investigation areas
- Related assets
- Security observations
# Domain Reconnaissance: example.com
## Summary
- Domain: example.com
- Registrar: Example Registrar
- Registration: 2010-01-15
- Expiry: 2026-01-15
## DNS Records
### A Records
- 1.2.3.4
- 5.6.7.8
### MX Records
- 10 mail.example.com
## Subdomains
- www.example.com (1.2.3.4)
- api.example.com (1.2.3.5)
- admin.example.com (1.2.3.6)
## Email Security
- SPF: Configured
- DMARC: Configured
- DKIM: Configured
## Technologies
- Web Server: nginx
- Framework: React
- CDN: Cloudflare
## Recommendations
- Interesting subdomains: admin.example.com, api.example.com
- Attack surface: 15 web applications identified
Reports saved to:
~/.claude/MEMORY/WORK/{current_work}/) - For iterative artifacts during investigation~/.claude/MEMORY/RESEARCH/YYYY-MM/) - For pentest engagements and formal assessmentsFor passive recon: No special MCP profile needed
For active recon: Requires security MCP profile
# Switch to security profile
~/.claude/MCPs/swap-mcp security
# Restart Claude Code to apply
# Then run active reconnaissance
Security profile includes:
CRITICAL RULES:
Authorization Types:
Never scan:
When in doubt: Ask for explicit confirmation and documented authorization.
User: "Do passive recon on example.com"
Assistant: Activating recon skill with passive-recon workflow.
Target: example.com
Mode: Passive only (no active scanning)
[Performs WHOIS, DNS, cert transparency, IPInfo]
[Generates report in scratchpad]
Report: ~/.claude/MEMORY/WORK/{current_work}/recon-example-com/
User: "Investigate IP 1.2.3.4 - I own this server"
Assistant: Activating recon skill with ip-recon workflow.
Target: 1.2.3.4
Authorization check: You confirmed this is an owned asset.
Proceeding with passive + active reconnaissance.
[Performs IPInfo, reverse DNS, WHOIS, port scan, service detection]
[Generates comprehensive report]
Report: Open ports found (22, 80, 443)
Services: SSH, HTTP, HTTPS
Technologies: nginx 1.20.1, OpenSSH 8.2
User: "Do OSINT on Acme Corp and map their infrastructure"
Assistant: Activating OSINT skill...
Found domains: acme.com, acmecorp.com, acme.io
Now calling recon for infrastructure mapping...
[Recon skill maps each domain]
[Discovers subdomains, IPs, netblocks]
[Creates comprehensive infrastructure map]
Report: Complete OSINT + Infrastructure report
15 domains, 47 subdomains, 3 netblocks identified
Automatic workflow selection based on input:
IpRecon.mdDomainRecon.mdNetblockRecon.mdPassiveRecon.mdUser can override:
"Use passive-recon workflow on 1.2.3.4"
"Run domain-recon on example.com with active scanning"
Passive Recon Success:
Active Recon Success:
Security Skills:
~/.claude/skills/Investigation/ - Entity and people reconnaissance (OSINT)~/.claude/skills/Security/WebAssessment/ - Web application testingTool Documentation:
Best Practices:
Remember: Start passive, confirm authorization before going active, document everything, and be respectful of target systems.
Weekly Installs
73
Repository
GitHub Stars
10.5K
First Seen
Jan 24, 2026
Security Audits
Gen Agent Trust HubWarnSocketWarnSnykFail
Installed on
codex62
gemini-cli61
opencode61
github-copilot57
claude-code55
cursor54
通过 LiteLLM 代理让 Claude Code 对接 GitHub Copilot 运行 | 高级变通方案指南
46,900 周安装
CLIP模型:OpenAI图像文本对比预训练,零样本分类与跨模态检索指南
215 周安装
Angular SignalStore 最佳实践 - NgRx 信号状态管理规则与技巧
222 周安装
lp-agent:自动化流动性提供策略工具 | Hummingbot API 与 Solana DEX 集成
217 周安装
SkyPilot 多云编排指南:跨 AWS/GCP/Azure 自动优化机器学习成本与分布式训练
215 周安装
邮件序列设计指南:自动化营销策略、模板与最佳实践 | 提升转化率
218 周安装
开发者成长分析工具 - 基于Claude Code聊天历史识别编码模式和改进领域
218 周安装