This tool uses Python Selenium to parse through certain sites and retrieve IP addresses, email addresses, and password leaks.
You need to have Mozilla Firefox installed. Your usernames and passwords are secure, and used only for logging in to the sites used by the tool when you request it. Information found gets saved in files named 'emails.txt' and 'ips.txt'. The leaks are always found last. Once the tool finishes, if you wanted leaks, you will need to hit 'Yes' to download the leak file. They will get saved in a file called 'Search Leaks.csv'.
To install and use this tool, download recon.py, recon.config, geckodriver.exe from here, urllib3 from here, and selenium from here. Selenium and urllib3 should be in the same folder. Make sure the geckodriver and selenium paths are in recon.config, lines 5 and 6 respectively. Example run: recon.py -a company.com -c "company name" "company name 2"
You must have a poppingboxes.com account and an actual hunter.io login/password. There is an option on the site to sign in with google, but you need to have a password and email with it. If you usually sign in with google, go to your account information and hit set password, then go to your email and folllow the instructions. In recon.config, put the necessary credentials in where it tells you to. Make sure to keep lines 1-6 as credentials only, in the correct order. Lines after 6 are avaialable for notes on what goes where.
To change the default settings, open the recon.py file in a text editor, and near the beggining it has lines that start with 'parser.add_argument'. Change the 'default=True' to 'default=False'. Near the end of the line it will say "action='store_false'", change it to "action='store_true'".