Raccoon logo

Raccoon

Fast, asynchronous reconnaissance suite for offensive security professionals

Raccoon automates DNS, WHOIS, TLS, port, subdomain, and web‑application reconnaissance, delivering organized results with Tor/proxy support and asyncio‑driven performance in a single command.

Overview

Overview

Raccoon is a command‑line reconnaissance suite aimed at penetration testers, bug bounty hunters, and red‑team operators who need rapid, scriptable data collection. Built with Python's asyncio, it runs many scans in parallel while offering optional anonymity through Tor or proxy lists.

Capabilities

The tool gathers DNS records, WHOIS data, TLS cipher and certificate details, and performs Nmap‑based port and service enumeration. It enumerates subdomains via Google dorking, DNS dumpster, SAN discovery, and brute‑force, and extracts extensive web‑application information such as CMS detection, server headers, robots.txt, sitemaps, cookies, forms, email addresses, and vulnerable S3 buckets. Results are saved in a structured folder hierarchy, making post‑scan analysis straightforward.

Deployment

Install via pip (pip install raccoon-scanner) or run the official Docker image. Prerequisites include Nmap and OpenSSL. The CLI provides granular options for wordlists, threading, and output handling, allowing integration into automated workflows.

Highlights

Asyncio‑based parallel scanning for speed
Built‑in Tor and proxy routing for anonymity
Comprehensive DNS, WHOIS, TLS, and subdomain enumeration
Integrated web‑app data extraction including CMS, forms, and vulnerable S3 buckets

Pros

  • High performance thanks to asyncio
  • All scans output to organized files
  • Extensive built‑in wordlists from SecLists
  • Simple CLI with many configurable options

Considerations

  • Requires external tools (Nmap, OpenSSL) pre‑installed
  • Tor/proxy routing slows overall runtime
  • Limited output formats (no JSON yet)
  • No native multi‑target file input (roadmap item)

Managed products teams compare with

When teams consider Raccoon, these hosted platforms usually appear on the same shortlist.

Acunetix logo

Acunetix

Web vulnerability scanner for automated security testing of websites and web apps

AppCheck logo

AppCheck

Automated web application and infrastructure vulnerability scanning platform

Burp Suite logo

Burp Suite

Web application security testing platform

Looking for a hosted option? These are the services engineering teams benchmark against before choosing open source.

Fit guide

Great for

  • Penetration testers needing fast, scriptable reconnaissance
  • Bug bounty hunters focusing on web‑application surface mapping
  • Red team operators requiring anonymous scanning
  • Security researchers automating data collection

Not ideal when

  • Users without Python or Nmap installed
  • Large‑scale asset inventories needing native multi‑host support
  • Teams requiring real‑time dashboards or GUI
  • Environments where JSON output is mandatory

How teams use it

Initial target profiling

Gather DNS records, WHOIS, and TLS details to build a baseline of the target’s infrastructure.

Web application surface discovery

Detect CMS, server headers, exposed directories, forms, and vulnerable S3 buckets, enabling focused exploitation.

Anonymous external scanning

Route HTTP requests through Tor or random proxies to hide source IP while enumerating subdomains and URLs.

Port and service enumeration

Run Nmap with optional scripts and vulnerability checks, producing organized reports for later analysis.

Tech snapshot

Python93%
Lua7%
Dockerfile1%

Tags

reconnaissancehacking-toolpentest-toolpentestingraccoonosintscannersecurity-scannerenumerationvulnerability-scannerfuzzinghackinginformation-gatheringvulnerability-assessmentoffensive-security

Frequently asked questions

Do I need Nmap installed to use Raccoon?

Yes, Nmap is required for port, service, and script scans; install it beforehand.

Can Raccoon output results in JSON?

Currently only file‑based folder output is supported; JSON output is planned for a future release.

How does Tor routing affect scan speed?

Routing through Tor adds latency and can significantly slow total runtime, but provides anonymity.

Is there a Docker image for Raccoon?

Yes, an official Dockerfile is provided; you can build and run scans inside the container.

What Python version is required?

Raccoon requires Python 3.5 or newer; use pip3 if your system defaults to Python 2.

Project at a glance

Stable
Stars
3,495
Watchers
3,495
Forks
441
LicenseMIT
Repo age7 years old
Last commit7 months ago
Primary languagePython

Last synced yesterday