github EPTLLC/brs v2.0
# Brabus Recon Suite (BRS) v2.0

one month ago
██████  ██████  ███████ 
██   ██ ██   ██ ██      
██████  ██████  ███████ 
██   ██ ██   ██      ██ 
██████  ██   ██ ███████ 

project: brabus recon suite (brs) | company: easyprotech llc (www.easypro.tech) | developer: brabus | created: 22.07.2025 03:06:28 | version: 2.0 | telegram: https://t.me/easyprotechaifactory

Professional Network Reconnaissance & Penetration Testing Toolkit

by EasyProTech LLC (www.easypro.tech)

Advanced suite of tools for network reconnaissance, domain analysis, vulnerability assessment and penetration testing with enhanced user experience and professional-grade interface.

🚀 What's New in V2.0

Major Enhancements

  • Domain Reconnaissance Module - Comprehensive domain analysis capabilities
  • Professional Interface - Clean, emoji-free menus for serious professionals
  • Advanced Progress Indicators - Live timers and cancellation support
  • Enhanced System Information - Detailed hardware, network, and security reporting
  • Improved Error Handling - Robust interrupt handling and cleanup procedures
  • Streamlined Architecture - Optimized code structure and performance

🎯 Core Improvements

  • Unified Spinner System - Consistent progress indication across all modules
  • Professional Menu Design - Removed emojis from menu items for business use
  • Better Resource Management - Enhanced cleanup and signal handling
  • Optimized Performance - Reduced redundancy and improved speed
  • Enhanced Documentation - Complete feature coverage and usage examples

📝 Development Notes

  • Language Support: Temporarily simplified to English-only during V2.0 development
  • Legacy Compatibility: V1.0 language files remain available in project history
  • Future Roadmap: Multi-language support will be restored in future releases

🚨 CRITICAL LEGAL WARNING

⚠️ UNAUTHORIZED USE IS ILLEGAL AND MAY RESULT IN CRIMINAL PROSECUTION ⚠️

THIS IS A PENETRATION TESTING TOOLKIT FOR AUTHORIZED SECURITY TESTING ONLY

Using this software to scan, probe, or attack networks, systems, or services that you do not own or have explicit written permission to test is ILLEGAL and may result in:

  • Criminal charges and prosecution under computer crime laws
  • Substantial fines (potentially millions of dollars)
  • Prison time (multiple years depending on severity)
  • Permanent criminal record
  • Civil lawsuits for damages and legal costs

AUTHORIZED USE ONLY:

  • Your own networks and systems
  • With explicit written authorization from system owners
  • Within scope of authorized penetration testing contracts
  • As part of legitimate bug bounty programs
  • In controlled educational environments

📦 Installation

git clone https://github.com/EasyProTech/brs.git && cd brs && ./main.sh

🚀 Quick Start

# Clone or extract the project to any directory
cd brs
./main.sh

All paths are automatically resolved relative to the project location.

🎯 Core Modules

1. Network Discovery

Comprehensive local network reconnaissance

Features:

  • Automatic network interface detection
  • Intelligent network range identification
  • Multi-method host discovery (ping sweep, ARP scan)
  • Fast port scanning of discovered hosts
  • MAC address vendor identification
  • Detailed network topology mapping
  • Professional progress indicators with live timers

Improvements in V2.0:

  • Enhanced host detection algorithms
  • Better network interface handling
  • Improved scan performance
  • Professional progress visualization

2. Port Scanning

Advanced port scanning capabilities

Scanning Modes:

  • Fast Scan - Top 1000 ports for quick reconnaissance
  • Full Scan - Complete 65535 port range analysis
  • Stealth SYN Scan - Covert reconnaissance techniques
  • UDP Scanning - UDP service discovery
  • Service Version Detection - Application fingerprinting
  • Aggressive Scanning - OS detection and script scanning
  • Tor Scanning - Anonymous scanning through Tor network
  • Mass Scanning - High-speed scanning with masscan
  • Batch Operations - Scan all discovered hosts automatically

V2.0 Enhancements:

  • Unified progress indication system
  • Better timeout handling
  • Enhanced result formatting
  • Professional interface design

3. Domain Reconnaissance (NEW in V2.0)

Comprehensive domain intelligence gathering

Core Capabilities:

  • Basic Domain Information - DNS records and infrastructure analysis
  • DNS Records Enumeration - Complete DNS record discovery (A, AAAA, MX, NS, TXT, etc.)
  • Subdomain Discovery - Advanced subdomain enumeration techniques
  • Email Harvesting - Email address discovery from various sources
  • Zone Transfer Testing - DNS zone transfer vulnerability assessment
  • Certificate Transparency - SSL certificate log analysis
  • WHOIS Information - Domain registration and ownership data
  • Web Technology Detection - Technology stack identification
  • Social Media Discovery - Social media presence analysis
  • Comprehensive Domain Scan - All-in-one domain assessment

Technical Features:

  • Certificate transparency log integration
  • Advanced subdomain discovery algorithms
  • Email pattern recognition
  • Technology fingerprinting
  • Professional progress indicators

4. Vulnerability Assessment

Professional security vulnerability detection

Assessment Types:

  • NSE Nmap Scripts - Advanced vulnerability detection scripts
  • Web Vulnerability Scanning - Nikto-based web application testing
  • SQL Injection Testing - SQLmap integration for database security
  • SMB Vulnerability Scanning - Windows network service testing
  • SSH Security Testing - SSH configuration and credential testing
  • FTP Security Assessment - FTP service vulnerability analysis
  • Telnet Security Testing - Legacy protocol security assessment
  • Network Shares Discovery - SMB/NFS share enumeration
  • SSL/TLS Analysis - Cryptographic protocol assessment
  • Comprehensive Scanning - Automated multi-vector testing
  • Automated Host Assessment - Batch vulnerability testing

V2.0 Improvements:

  • Enhanced vulnerability detection algorithms
  • Better result categorization
  • Professional progress tracking
  • Improved error handling

5. System Information

Comprehensive system reconnaissance and analysis

Information Categories:

  • Full System Report - Complete system analysis with executive summary
  • System Information - OS, kernel, architecture, hostname, uptime details
  • Hardware Information - CPU, memory, storage analysis
  • Network Configuration - Interface details, routing tables, active connections
  • Security Status - Firewall status, user activity, authentication logs
  • Running Services - Service status analysis and monitoring
  • Connected Devices - USB, PCI, WiFi, Bluetooth device enumeration

V2.0 Features:

  • Professional progress indicators for long operations
  • Enhanced data collection algorithms
  • Better categorization and formatting
  • Timestamped result files
  • Executive summary generation

6. Attack Tools

Professional penetration testing capabilities

⚠️ AUTHORIZED TESTING ONLY!

Attack Categories:

  • Credential Attacks - SSH, FTP, HTTP, Telnet, RDP brute force
  • Network Attacks - DoS attacks, ARP spoofing, MITM operations
  • Web Application Attacks - Directory brute forcing, web-based attacks
  • Wireless Attacks - WiFi security assessment and handshake capture
  • Custom Wordlists - Flexible credential dictionary support

V2.0 Enhancements:

  • Professional progress tracking
  • Better attack success reporting
  • Enhanced logging and documentation
  • Improved safety measures

🛠️ Technical Requirements

System Dependencies

  • nmap - Network mapping and port scanning
  • masscan - High-speed port scanning
  • hydra - Network authentication cracking
  • nikto - Web server vulnerability scanner
  • sqlmap - SQL injection testing tool
  • dig - DNS lookup utility
  • whois - Domain registration lookup
  • curl - HTTP/HTTPS client for web requests
  • jq - JSON processing for API responses
  • john - Password cracking utilities
  • ettercap - Network security toolkit
  • aircrack-ng - WiFi security auditing

System Requirements

  • Ubuntu 22.04+ or compatible Linux distribution
  • Sudo privileges for advanced scanning techniques
  • Minimum 4GB RAM for optimal performance
  • 5GB free disk space for results and wordlists
  • Network interfaces for wireless testing (optional)

📊 Results Management

All scan results are automatically saved with timestamps:

results/
├── 20250722-030628_network_scan.txt
├── 20250722-030645_domain_recon_example.com.txt
├── 20250722-030702_vuln_scan_192.168.1.100.txt
├── 20250722-030715_system_info.txt
└── 20250722-030730_port_scan_192.168.1.0-24.txt

File Naming Convention:

  • YYYYMMDD-HHMMSS_operation_target.txt
  • Automatic result categorization
  • Timestamped for audit trails
  • Professional formatting for reporting

🔧 Configuration Management

Language Configuration (V2.0 Development)

During V2.0 development, the system operates in English-only mode for:

  • Simplified development and testing
  • Consistent user experience
  • Reduced complexity during feature development

Note: Multi-language support from V1.0 is preserved and will be restored in future releases. Language files are available in the project repository for reference.

Professional Interface Settings

  • Clean, emoji-free menu design
  • Consistent progress indication
  • Professional color schemes
  • Business-appropriate formatting

🚀 Usage Examples

Complete Network Assessment

./main.sh
# 1) Network Discovery -> Discover all network hosts
# 2) Port Scanning -> 9) Scan all discovered hosts
# 4) Vulnerability Search -> 11) Auto-scan all hosts
# 7) Results -> Review comprehensive findings

Domain Intelligence Gathering

./main.sh
# 3) Domain Reconnaissance
# 10) Comprehensive Domain Scan
# Enter target domain: example.com

System Analysis

./main.sh
# 5) System Information
# 1) Full System Report -> Complete system analysis

Professional Vulnerability Assessment

./main.sh
# 4) Vulnerability Search
# 10) Comprehensive vulnerability scanning
# Review results in timestamped files

📈 Professional Workflow

1. Reconnaissance Phase

# Network discovery and mapping
./main.sh → 1) Network Discovery
# Domain intelligence gathering
./main.sh → 3) Domain Reconnaissance

2. Scanning Phase

# Comprehensive port analysis
./main.sh → 2) Port Scanning → 9) Scan all hosts
# System information gathering
./main.sh → 5) System Information → 1) Full Report

3. Assessment Phase

# Vulnerability identification
./main.sh → 4) Vulnerability Search → 10) Comprehensive
# Security configuration analysis

4. Testing Phase (Authorized Only)

# Controlled penetration testing
./main.sh → 6) Attack Tools → Select appropriate tests

5. Reporting Phase

# Results compilation and analysis
./main.sh → 7) Results → Review all findings

🔍 Advanced Features

Progress Indication System

  • Live Timers - Real-time operation duration tracking
  • Cancellation Support - Ctrl+C handling with proper cleanup
  • Professional Animation - Unicode spinner indicators
  • Operation Status - Clear completion messaging

Professional Interface Design

  • Clean Menus - Emoji-free, business-appropriate design
  • Consistent Formatting - Standardized output across modules
  • Color Coding - Professional color schemes for different message types
  • Structured Output - Organized, readable result presentation

Enhanced Error Handling

  • Graceful Interruption - Proper signal handling
  • Resource Cleanup - Automatic temporary file management
  • Error Recovery - Robust handling of unexpected conditions
  • Logging Integration - Comprehensive error documentation

🆘 Troubleshooting

Common Issues and Solutions

Permission Issues:

chmod +x main.sh scripts/*.sh

Missing Dependencies:

./main.sh → 8) Settings → 2) Check Tools

Network Access Issues:

  • Verify network connectivity
  • Check firewall settings
  • Ensure proper interface configuration

Performance Issues:

  • Increase system resources
  • Reduce scanning parallelism
  • Use targeted scanning instead of broad sweeps

📚 Documentation References

🔄 Version History

V2.0 (Current)

  • Domain Reconnaissance Module - Complete domain analysis capabilities
  • Professional Interface - Business-appropriate menu design
  • Enhanced Progress System - Live timers and cancellation support
  • Improved System Analysis - Comprehensive system information gathering
  • Streamlined Development - English-only mode for development phase

V1.0 (Legacy)

  • Basic network reconnaissance
  • Multi-language support (7 languages)
  • Core vulnerability scanning
  • Basic attack tools
  • Foundation architecture

⚖️ LEGAL DISCLAIMER

🚨 CRITICAL: READ CAREFULLY BEFORE USE

BY USING THIS SOFTWARE, YOU AGREE TO BE LEGALLY BOUND BY ALL TERMS.

AUTHORIZED USE REQUIREMENTS:

  • ✅ Explicit written authorization for target systems
  • ✅ Professional penetration testing contracts
  • ✅ Authorized security research activities
  • ✅ Educational use in controlled environments
  • ✅ Bug bounty programs within scope

STRICTLY PROHIBITED:

  • ❌ Unauthorized network scanning or testing
  • ❌ Attacks on systems without permission
  • ❌ Malicious or illegal activities
  • ❌ Violation of applicable laws and regulations

LEGAL CONSEQUENCES:

Unauthorized use may result in prosecution under computer crime laws worldwide, including substantial fines and imprisonment.

COMPLETE LIABILITY DISCLAIMER:

EasyProTech LLC provides this software "AS IS" with NO WARRANTY and accepts NO RESPONSIBILITY for misuse, damage, or legal consequences.

YOU BEAR FULL RESPONSIBILITY FOR YOUR ACTIONS.

🔐 Release Verification

⚠️ IMPORTANT: Always verify downloaded releases to ensure authenticity!

GPG Signature Verification

All official BRS releases are cryptographically signed with GPG:

Download and verify:

# Download the public key
curl -O https://easypro.tech/keys/brs/brs-signing-key-v2.0.asc
curl -O https://easypro.tech/keys/brs/RELEASE_METADATA.txt

# Import the key
gpg --import brs-signing-key-v2.0.asc

# Verify signatures
gpg --verify brs-v2.0.tar.gz.asc brs-v2.0.tar.gz
gpg --verify brs-v2.0.zip.asc brs-v2.0.zip

# Verify checksums
sha256sum -c brs-v2.0.sha256
sha512sum -c brs-v2.0.sha512

GPG Key Information:

  • Key ID: 9E8DB39DCFFF51D8
  • Fingerprint: 7A69B983BB4F308184FD21229E8DB39DCFFF51D8
  • Owner: EPT LLC mail@easypro.tech
  • SHA256: 7e97952082610f28a4ce89d11f8f97a414ce80bf3146b5364f494805f6e23c73

Security: Only use releases with valid GPG signatures! See KEY_VERIFICATION.md for detailed instructions.

📞 Support Policy

No Support Provided: This project is released as-is without support, consultation, or assistance.

Community Contributions: Development contributions are welcome but not obligated.

📜 License

DUAL LICENSE STRUCTURE

GPLv3 License (Open Source)

  • Educational, research, and open-source projects
  • Copyleft compliance required

Commercial License

  • Commercial entities and proprietary projects
  • Contact: @easyprotechaifactory (Telegram)

See LICENSE file for complete terms.


Brabus Recon Suite V2.0 | EasyProTech LLC | Lead Developer: brabus | @easyprotechaifactory

Professional Network Reconnaissance for Authorized Security Testing

Don't miss a new brs release

NewReleases is sending notifications on new releases.