Skip to content

ZeroTrace OSINT

Recon Command Builders

Six builders that turn point-and-click options into the exact command you'd run in your terminal — Nmap, Gobuster, SQLMap, Sublist3r, Google Dorks, and wordlist generators.

The Recon Command Builders are a different category from the rest of the toolkit. They do not run anything against a target. They generate commands you'd run yourself in a terminal, in a controlled environment, against targets you have permission to test.

The reason: industry-standard reconnaissance tools (Nmap, Gobuster, SQLMap, Sublist3r) live in your shell, not embedded in a desktop app. Their flag interfaces are powerful but unfriendly. The builders give you a dialled-in, explained, copy-pasteable command.

What's in this section

BuilderWhat it generates
NmapPort-scan and version-detection commands with a live "explain" panel
GobusterDirectory and DNS brute-force commands with wordlist preview
SQLMapSQL-injection test commands with payload preview
Sublist3rSubdomain-enumeration command lines
Google DorksAdvanced Google search queries with shorthand syntax
Wordlist generatorsCustom dictionaries from text, sites, names, and patterns

Authorisation matters. The commands these builders generate produce real traffic against the target. Use them only against assets you own, manage, or have written permission to test. Most jurisdictions treat unauthorised port scanning, brute-forcing, and SQL-injection probing as offences regardless of intent.

Why builders rather than running the tools

A few reasons the toolkit ships builders instead of embedded scanners:

  1. Permission and scoping. The act of generating a command is risk-free. The act of running it requires a controlled environment, an authorised target, and an investigator who has thought about the consequences. Separating those steps is deliberate.
  2. Tool versions. Nmap, Gobuster, SQLMap evolve. Embedding old versions inside the toolkit would mean shipping out-of-date scanners. Generating commands lets you use whatever version you have installed.
  3. Output flexibility. Industry tools have well-understood output formats that integrate with downstream pipelines (CI, SIEM, ticketing). Running them yourself preserves those integrations.
  4. Audit trail. When you run a command from your shell, your shell history captures it. The toolkit's profile system captures the generated command alongside the rest of your investigation, but the actual execution stays in your environment.

Common workflow

For each builder:

  1. Open the builder for the tool you want.
  2. Configure the options through the UI.
  3. Read the live "explain" panel — confirm what each enabled flag does.
  4. Copy the generated command.
  5. Run it in a terminal, inside your authorised testing environment.
  6. Pin the generated command (and optionally the output) to your investigation profile.

Pinning the command preserves the configuration of the test alongside your other findings. If you re-run the test six months later, the saved command tells you what changed.

Composition with other tools

Builder outputs are inputs to other tools:

  • Subdomain wordlists generated by the wordlist generator feed into Sublist3r commands.
  • Discovered subdomains from Sublist3r feed into Nmap commands as scan targets.
  • Open ports from Nmap output feed back into the exposed services tool for context.
  • Discovered web paths from Gobuster feed into site analysis per path.

The builder produces the command; the rest of the toolkit consumes the results.

Command Palette

Search for a command to run...