
How I Built HX-Recon-Lite Using Existing Open Source Tools
Every new security founder makes this mistake.
They think they need to build everything from scratch.
I almost made the same mistake.
When I started working on offensive security tools under HEXNULL, I had two options:
Option 1:
Build an entirely new recon engine from scratch
or
Option 2:
Use proven open-source tools and build better architecture around them
I chose option two.
And that decision saved me months of wasted development.
The Problem With Modern Recon Workflows
Recon is one of the most repetitive parts of penetration testing.
Most people manually run tools like:
- subfinder
- amass
- assetfinder
- dnsx
- httpx
- nuclei
The workflow usually looks like this:
Run tool
Export output
Clean duplicates
Run another tool
Filter results
Save files
Repeat
This gets annoying very fast.
Especially when you’re handling multiple targets.
The problem wasn’t a lack of tools.
The problem was workflow fragmentation.
Why I Didn’t Build My Own Subdomain Finder
Because that would be stupid.
Seriously.
Subfinder already works extremely well.
Amass already works.
Httpx already works.
Dnsx already works.
These tools are maintained by teams that have spent years improving them.
Trying to replace them from scratch would be inefficient.
HEXNULL is about leverage.
Not ego-driven development.
What HX-Recon-Lite Actually Does
HX-Recon-Lite acts as a structured recon layer on top of existing tools.
It automates:
- subdomain discovery
- DNS validation
- alive host detection
- output filtering
- result storage
- project management
The Core Workflow
The workflow looks like this:
Target Input
↓
Subdomain Enumeration
↓
DNS Resolution
↓
HTTP Probing
↓
Categorized Outputs
↓
Project Storage
Why Project-Based Architecture Matters
This was one of the biggest features I wanted.
Most recon scripts are disposable.
You run them once and forget everything.
HX-Recon-Lite stores every target inside separate project folders.
That means users can:
- revisit scans
- rerun recon
- update findings
- manage multiple targets
This makes the tool much more practical.
Why I Added Menu-Based Workflow
I didn’t want users constantly typing commands.
So I added:
- New Project
- Load Project
- Run New Recon
- View Results
- Delete Project
This makes the tool easier to use without sacrificing technical capability.
Why Output Structure Matters
Raw recon output is messy.
HX-Recon-Lite organizes data into:
- subdomains.txt
- alive.txt
- alive_200.txt
- alive_403.txt
- alive_500.txt
- result.json
This allows users to move faster during testing.
Why This Is Just The Beginning
HX-Recon-Lite is intentionally lightweight.
It’s the first layer of a much bigger ecosystem.
Future versions may include:
- deeper recon intelligence
- cloud asset discovery
- certificate analysis
- AI-assisted filtering
- automated prioritization
The Bigger Philosophy Behind HEXNULL
I’m not trying to build hundreds of random tools.
I want to build:
small
modular
effective systems
That can eventually connect into larger offensive workflows.
HX-Recon-Lite is the first example of that philosophy.
What I Learned
Building from scratch sounds impressive.
But smart builders know when to leverage existing infrastructure.
Sometimes innovation isn’t about creating new tools.
It’s about creating better systems.
That’s exactly what HX-Recon-Lite represents.
Final Thoughts
The future of offensive security tools won’t belong to people who rebuild everything.
It will belong to people who build smarter architectures.
That’s what I’m doing at HEXNULL.
And HX-Recon-Lite is just the beginning.

How I Built HX-Recon-Lite Using Existing Open Source Tools
Every new security founder makes this mistake. They think they need to build everything from scratch. I almost made the

Why Most AI Security Agents Fail in Real Penetration Testing
rtificial intelligence is everywhere right now. Every week I see people building: AI pentesting bots autonomous hacking agents GPT-powered recon

What is HEXNULL and Why Autonomous Security Needs Architecture
Introduction Autonomous security is not a feature. It is not a chatbot wrapper around nmap.It is not an LLM summarizing