Metadata-Version: 2.1
Name: reconDNS
Version: 0.0.1
Summary: DNS Enumeration Script
Home-page: https://github.com/f8al/dnsrecon
Author: @SecurityShrimp
License: UNKNOWN
Description: 
        # reconDNS
        [![Language grade: Python](https://img.shields.io/lgtm/grade/python/g/darkoperator/dnsrecon.svg?logo=lgtm&logoWidth=18)](https://lgtm.com/projects/g/darkoperator/dnsrecon/context:python)
        
        reconDNS is a Python module port of a script that was written by Dark Operator
        
        This script provides the ability to perform:
        * Check all NS Records for Zone Transfers.
        * Enumerate General DNS Records for a given Domain (MX, SOA, NS, A, AAAA, SPF and TXT).
        * Perform common SRV Record Enumeration.
        * Top Level Domain (TLD) Expansion.
        * Check for Wildcard Resolution.
        * Brute Force subdomain and host A and AAAA records given a domain and a wordlist.
        * Perform a PTR Record lookup for a given IP Range or CIDR.
        * Check a DNS Server Cached records for A, AAAA and CNAME Records provided a list of host records in a text file to check.
        
        # Python Version
        DNSRecon requires python3.6+
Platform: UNKNOWN
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: 3.7
Classifier: Programming Language :: Python :: 3.8
Classifier: License :: OSI Approved :: GNU General Public License v2 (GPLv2)
Classifier: Operating System :: OS Independent
Requires: dnspython
Requires: netaddr
Requires: lxml
Requires: flake8
Requires-Python: >=3.6
Description-Content-Type: text/markdown
