How I Built HX-Recon-Lite Using Existing Open Source Tools

Every new security founder makes this mistake.

They think they need to build everything from scratch.

I almost made the same mistake.

When I started working on offensive security tools under HEXNULL, I had two options:

Option 1:

Build an entirely new recon engine from scratch

or

Option 2:

Use proven open-source tools and build better architecture around them

I chose option two.

And that decision saved me months of wasted development.


The Problem With Modern Recon Workflows

Recon is one of the most repetitive parts of penetration testing.

Most people manually run tools like:

  • subfinder
  • amass
  • assetfinder
  • dnsx
  • httpx
  • nuclei

The workflow usually looks like this:

Run tool
Export output
Clean duplicates
Run another tool
Filter results
Save files
Repeat

This gets annoying very fast.

Especially when you’re handling multiple targets.

The problem wasn’t a lack of tools.

The problem was workflow fragmentation.


Why I Didn’t Build My Own Subdomain Finder

Because that would be stupid.

Seriously.

Subfinder already works extremely well.

Amass already works.

Httpx already works.

Dnsx already works.

These tools are maintained by teams that have spent years improving them.

Trying to replace them from scratch would be inefficient.

HEXNULL is about leverage.

Not ego-driven development.


What HX-Recon-Lite Actually Does

HX-Recon-Lite acts as a structured recon layer on top of existing tools.

It automates:

  • subdomain discovery
  • DNS validation
  • alive host detection
  • output filtering
  • result storage
  • project management

The Core Workflow

The workflow looks like this:

Target Input

Subdomain Enumeration

DNS Resolution

HTTP Probing

Categorized Outputs

Project Storage

Why Project-Based Architecture Matters

This was one of the biggest features I wanted.

Most recon scripts are disposable.

You run them once and forget everything.

HX-Recon-Lite stores every target inside separate project folders.

That means users can:

  • revisit scans
  • rerun recon
  • update findings
  • manage multiple targets

This makes the tool much more practical.


Why I Added Menu-Based Workflow

I didn’t want users constantly typing commands.

So I added:

  • New Project
  • Load Project
  • Run New Recon
  • View Results
  • Delete Project

This makes the tool easier to use without sacrificing technical capability.


Why Output Structure Matters

Raw recon output is messy.

HX-Recon-Lite organizes data into:

  • subdomains.txt
  • alive.txt
  • alive_200.txt
  • alive_403.txt
  • alive_500.txt
  • result.json

This allows users to move faster during testing.


Why This Is Just The Beginning

HX-Recon-Lite is intentionally lightweight.

It’s the first layer of a much bigger ecosystem.

Future versions may include:

  • deeper recon intelligence
  • cloud asset discovery
  • certificate analysis
  • AI-assisted filtering
  • automated prioritization

The Bigger Philosophy Behind HEXNULL

I’m not trying to build hundreds of random tools.

I want to build:

small
modular
effective systems

That can eventually connect into larger offensive workflows.

HX-Recon-Lite is the first example of that philosophy.


What I Learned

Building from scratch sounds impressive.

But smart builders know when to leverage existing infrastructure.

Sometimes innovation isn’t about creating new tools.

It’s about creating better systems.

That’s exactly what HX-Recon-Lite represents.


Final Thoughts

The future of offensive security tools won’t belong to people who rebuild everything.

It will belong to people who build smarter architectures.

That’s what I’m doing at HEXNULL.

And HX-Recon-Lite is just the beginning.

 

Leave a Reply

Your email address will not be published. Required fields are marked *