Skip to content

Raccoon - Offensive Reconnaissance Tool Cheatsheet

Raccoon - Offensive Reconnaissance Tool Cheatsheet

Section titled “Raccoon - Offensive Reconnaissance Tool Cheatsheet”

A high-performance offensive security tool for automated reconnaissance. Combines DNS enumeration, WHOIS lookups, TLS analysis, port scanning, subdomain discovery, URL fuzzing, and WAF detection in a single tool with asynchronous performance.

Legal Notice: Only use Raccoon against targets you have explicit written authorization to test. Unauthorized scanning is illegal.

MethodCommand
pip (Stable)pip install raccoon-scanner
pip3 (Python 3.5+)pip3 install raccoon-scanner
From sourcegit clone https://github.com/evyatarmeged/Raccoon.git && cd Raccoon && python setup.py develop
Dockerdocker build -t raccoon . && docker run raccoon example.com
DependencyPurposeInstall
NmapPort scanningsudo apt install nmap / brew install nmap
OpenSSLTLS/SSL analysisUsually pre-installed
coreutils (macOS)Timeout supportbrew install coreutils
# Basic scan of a target
raccoon example.com

# Full scan with service detection
raccoon -f example.com

# Scan with output directory
raccoon -o /path/to/output example.com

# Quick scan skipping Nmap
raccoon --skip-nmap-scan example.com

# Quiet mode (minimal output)
raccoon -q example.com
CommandDescription
raccoon example.comDefault DNS records: A, MX, NS, CNAME, SOA, TXT
raccoon -d A,AAAA,MX example.comQuery specific DNS record types
raccoon --no-sub-enum example.comSkip subdomain enumeration
raccoon --subdomain-list subs.txt example.comUse custom subdomain wordlist
CommandDescription
raccoon example.comDefault Nmap scan
raccoon -sc example.comRun with Nmap scripts (service detection scripts)
raccoon -sv example.comRun with service version detection
raccoon -f example.comFull scan (both -sc and -sv flags)
raccoon -p 80,443,8080 example.comScan specific ports
raccoon -p 1-1000 example.comScan port range
raccoon --vulners-nmap-scan example.comPerform vulnerability assessment scan
raccoon --vulners-path /path/to/script example.comCustom nmap_vulners.nse script path
raccoon --skip-nmap-scan example.comSkip port scanning entirely
CommandDescription
raccoon example.comDefault URL fuzzing with built-in wordlist
raccoon -w /path/to/wordlist.txt example.comUse custom wordlist for URL fuzzing
raccoon -T 50 example.comUse 50 threads for fuzzing (default: 25)
raccoon -fr example.comFollow HTTP redirects during fuzzing
raccoon --no-url-fuzzing example.comDisable URL/directory discovery
raccoon --ignored-response-codes 403,500 example.comCustom ignored HTTP status codes
raccoon --tls-port 8443 example.comCustom TLS port (default: 443)
CommandDescription
raccoon --tor-routing example.comRoute all traffic through Tor (port 9050)
raccoon --proxy http://proxy:8080 example.comUse a specific proxy
raccoon --proxy-list proxies.txt example.comRandom proxy rotation from list
raccoon -c "session:abc123" example.comAdd custom cookies (key:value format)
CommandDescription
raccoon -o ./results example.comSave results to specified directory
raccoon -q example.comSuppress console output
raccoon --skip-health-check example.comSkip initial target availability check
FlagLong FormDescription
-d--dns-recordsDNS record types to query (comma-separated)
-o--outdirOutput directory for results
-q--quietSuppress output
-w--wordlistCustom fuzzing wordlist
-T--threadsThread count (default: 25)
-sc--scriptsRun Nmap service detection scripts
-sv--servicesRun Nmap version detection
-f--full-scanFull Nmap scan (-sc + -sv)
-p--portCustom port range
-fr--follow-redirectsFollow HTTP redirects
-c--cookiesAdd cookies (key:value)
--tor-routingRoute through Tor
--proxyHTTP proxy address
--proxy-listFile with proxy list
--no-url-fuzzingSkip URL discovery
--no-sub-enumSkip subdomain enumeration
--skip-nmap-scanSkip port scanning
--skip-health-checkSkip availability check
--vulners-nmap-scanVulnerability assessment
--subdomain-listCustom subdomain wordlist
--tls-portCustom TLS port
--ignored-response-codesHTTP codes to ignore
--versionShow version
--helpShow help

Raccoon automatically performs these checks during a scan:

ModuleWhat It Does
DNS EnumerationQueries configured DNS record types
WHOIS LookupRetrieves domain registration info
TLS/SSL AnalysisChecks certificate details and cipher suites
Port ScanningNmap scan with optional scripts and version detection
Subdomain DiscoveryEnumerates subdomains using wordlist
URL FuzzingDiscovers hidden directories and files
WAF DetectionIdentifies web application firewalls
Web App ReconAnalyzes web technologies and headers
# Quick recon — skip heavy scanning
raccoon --skip-nmap-scan example.com

# Comprehensive audit
raccoon -f --vulners-nmap-scan -T 50 -o ./audit_results example.com

# Stealthy scan through Tor
raccoon --tor-routing -T 5 -q example.com

# Subdomain-focused discovery
raccoon --no-url-fuzzing --subdomain-list large_subs.txt example.com

# Web app directory bruteforce only
raccoon --skip-nmap-scan --no-sub-enum -w /usr/share/wordlists/dirb/big.txt example.com

# Docker scan with results saved to host
docker run -v $(pwd)/results:/home/raccoon raccoon example.com -o /home/raccoon

Results are saved in the output directory organized by scan type:

results/
├── dns_records.txt
├── whois.txt
├── tls_info.txt
├── nmap_scan.txt
├── subdomains.txt
├── url_fuzzing.txt
├── waf_detection.txt
└── web_recon.txt