Skip to main content

ReconX - Project by Kushagra Sharma

2 Minutes272 words2 views
ReconX
README.md272 lines

ReconX

The idea behind ReconX was simple – take the kind of network recon tools you’d normally run on a laptop terminal and put them on a phone. Because sometimes you’re sitting in a café and you just want to see what’s on the network.

Before anyone asks – yes, this is for authorized testing only. Don’t be that person.

What it does

  • Wi-Fi Analysis: Scan nearby networks, signal strength, channel info
  • Device Scanning: Find devices on the local network using ARP and mDNS
  • Packet Sniffing: Raw packet capture (needs root, obviously)
  • TLS/SSL Inspection: Intercept and inspect HTTPS traffic via Mitmproxy

The Stack

Flutter for the UI because cross-platform mobile dev and i didn’t want to write the same UI twice. Rust for the heavy lifting – the actual scanning, packet processing, and performance-critical bits.

Under the hood it integrates:

  • Nmap – for service/version detection
  • libpcap – for raw packet capture
  • Mitmproxy – for HTTPS interception

Getting Rust and Flutter to talk to each other via FFI was its own adventure. The Dart FFI bridge is functional but not exactly ergonomic – lots of unsafe blocks and pointer juggling. Worth it though, because having Rust handle the network layer means the actual scanning is fast and memory-safe.

Current state

It works but it’s rough around the edges. The UI needs polish, some features are half-implemented, and the root requirement limits the audience. But as a proof of concept for mobile network security tooling – it does the job.

Not planning to ship this to the Play Store for obvious reasons. It’s a personal tool and a learning exercise in combining Flutter’s UI capabilities with Rust’s systems-level power.

comments0 comments

Loading comments...

© 2026 Kushagra Sharma (TheDarkArtist)

https://www.thedarkartist.in/projects/reconx