Network & Web Reconnaissance Tool — Developed by KAZAM
imRobust is a powerful, modular, and user-friendly tool designed for developers, penetration testers, and security researchers. It automates a wide range of reconnaissance techniques to gather detailed and actionable information about networks and web applications. Whether you need to map open ports, analyze SSL certificates, or enumerate web directories, imRobust provides a one-stop solution.
--pingPing the target host--dnsDNS lookup--whoisWHOIS information--traceTraceroute to the target--geoipGet geographical info about IP--reverse-ipFind domains on the same server--sniffBasic packet sniffing (with--interface)
--sslRetrieve SSL certificate info--ssl-scanScan for SSL/TLS vulnerabilities
--url<target>Target URL for analysis--headersExtract HTTP headers--cookiesExtract cookies--linksExtract all hyperlinks--formsExtract HTML forms--scriptsExtract JavaScript files--statusGet HTTP status code--robotsFetchrobots.txt--sitemapFetchsitemap.xml--fingerprintFingerprint HTTP headers--redirectsTrace redirect chains--find-adminFind admin panel URLs--http-methodsCheck allowed HTTP verbs--cms-detectionDetect Content Management System
--wordlist<file>Password bruteforce--userlist<file>Username bruteforce--subdomainsSubdomain enumeration--subdomains-wordlist<file>--dir-bruteDirectory bruteforce--dir-wordlist<file>Wordlist for directories
--port<list>Port scan--service-detectionDetect services on open ports
--save<file>Save results to file--formatjson|csvOutput format
git clone https://github.com/kazamdev/imRobust
cd imRobust
pip install -r requirements.txt# Ping target and perform DNS lookup
python imRobust.py --ping --dns example.com
# Scan specific ports on an IP with 10 threads and timeout 5s
python imRobust.py --port 80 443 8080 -T 10 -t 5 192.168.1.1
# Perform web reconnaissance on a URL and extract headers, cookies, links
python imRobust.py --url https://example.com --headers --cookies --links
# Enumerate subdomains with a wordlist and save output as JSON
python imRobust.py --subdomains --subdomains-wordlist subdomains.txt --save results.json --format json example.com
# Check SSL certificate and scan for vulnerabilities
python imRobust.py --ssl --ssl-scan example.com
# Check if port 22 is open on a remote IP
python imRobust.py --checkport 192.168.1.100:22Contributions are welcome! If you want to suggest new features, report bugs, or improve documentation, please open an issue or submit a pull request.
Please follow the Code of Conduct and ensure your contributions align with the project’s goals.
This project is licensed under the MIT License. See the LICENSE file for details.
imRobust is intended for ethical security research and authorized penetration testing only. Unauthorized scanning, reconnaissance, or attacks on systems without permission may be illegal and unethical.
Use responsibly and always obtain explicit authorization before targeting any network or website.