ReconX
The idea behind ReconX was simple – take the kind of network recon tools you’d normally run on a laptop terminal and put them on a phone. Because sometimes you’re sitting in a café and you just want to see what’s on the network.
Before anyone asks – yes, this is for authorized testing only. Don’t be that person.
What it does
- Wi-Fi Analysis: Scan nearby networks, signal strength, channel info
- Device Scanning: Find devices on the local network using ARP and mDNS
- Packet Sniffing: Raw packet capture (needs root, obviously)
- TLS/SSL Inspection: Intercept and inspect HTTPS traffic via Mitmproxy
The Stack
Flutter for the UI because cross-platform mobile dev and i didn’t want to write the same UI twice. Rust for the heavy lifting – the actual scanning, packet processing, and performance-critical bits.
Under the hood it integrates:
- Nmap – for service/version detection
- libpcap – for raw packet capture
- Mitmproxy – for HTTPS interception
Getting Rust and Flutter to talk to each other via FFI was its own adventure. The Dart FFI bridge is functional but not exactly ergonomic – lots of unsafe blocks and pointer juggling. Worth it though, because having Rust handle the network layer means the actual scanning is fast and memory-safe.
Current state
It works but it’s rough around the edges. The UI needs polish, some features are half-implemented, and the root requirement limits the audience. But as a proof of concept for mobile network security tooling – it does the job.
Not planning to ship this to the Play Store for obvious reasons. It’s a personal tool and a learning exercise in combining Flutter’s UI capabilities with Rust’s systems-level power.
Loading comments...