Skip to content

VritraSecz/BloodRecon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

🩸 BloodRecon 🩸

Python License Platform Version Status Maintained Stars Forks Issues Contributors Languages Code Size

⚑ OSINT Intelligence Framework ⚑

🩸 Blood is the Key 🩸

A comprehensive OSINT toolkit for cybersecurity professionals, penetration testers, bug bounty hunters, and digital forensics investigators.


πŸŽ‰ What's New in v1.2.0

πŸš€ Enhanced Shodan Integration

We've completely revamped the Shodan integration with powerful new features that make API key management effortless!

✨ Key Improvements:

πŸ”§ Command Line API Management

# Set your Shodan API key instantly - no more interactive prompts!
python3 bloodrecon.py --shodan-api "your_api_key_here"

πŸ“ Streamlined Configuration

  • New Location: ~/.config-vritrasecz/bloodrecon-shodan.json
  • Auto Directory Creation: Tool creates config directories automatically
  • JSON-Only Storage: Simplified, reliable configuration management

πŸ”’ Smart API Key Handling

  • Automatic Replacement: New API keys seamlessly replace existing ones
  • Input Validation: Enhanced validation prevents empty or invalid keys
  • Better Error Messages: Clear, actionable feedback for users

⚑ Improved User Experience

  • One-Command Setup: Get Shodan running with a single command
  • Non-Interactive Mode: Perfect for automation and scripting
  • Cleaner Output: More intuitive and professional interface

πŸ› οΈ Quick Setup Example:

# 1. Set your API key (one time setup)
python3 bloodrecon.py --shodan-api "your_shodan_api_key"

# 2. Start using Shodan immediately
python3 bloodrecon.py --shodan 8.8.8.8
python3 bloodrecon.py --shodan google.com

πŸ’‘ Pro Tip: Your API key is saved securely and will be used automatically for all future Shodan queries!

πŸ“‹ What Changed:

  • Moved from ~/.osint_shodan_config to organized ~/.config-vritrasecz/ directory
  • Removed dual config.py file management for simplified workflow
  • Enhanced error handling and user feedback
  • Added --shodan-api command line argument

πŸ”— Get Started: View complete changelog β€’ API Configuration Guide


πŸ“– Table of Contents


🎯 Overview

BloodRecon is a state-of-the-art OSINT (Open Source Intelligence) framework that provides cybersecurity professionals with 34+ specialized modules for comprehensive reconnaissance and intelligence gathering. Built with Python 3.x, it offers both interactive menu-driven and command-line interfaces for maximum flexibility.

✨ Key Features

πŸ” 34 Specialized OSINT Modules
🌐 Network & Infrastructure Analysis (IP, DNS, WHOIS, SSL, Ports)
πŸ”’ Web Application Security Testing (Headers, Robots, Directories)
πŸ‘₯ Social Media & Personal Intelligence (GitHub, Social Platforms)
πŸ“„ Document & Metadata Analysis (EXIF, Document Properties)
πŸ”Ž Advanced Search Capabilities (Google Dorking, Wayback Machine)
πŸ“ž Communication Intelligence (Email, Phone Number Analysis)
πŸ›‘οΈ Threat Intelligence Integration (Shodan)
πŸ’Ύ Data Breach & Leak Detection
🎨 Interactive CLI Interface with Target Input Examples
🌈 Colored Terminal Output for Enhanced Readability


πŸ› οΈ Installation

Linux Installation

# Clone the repository
git clone https://github.com/VritraSecz/BloodRecon.git

# Navigate to the project directory
cd BloodRecon

# Install Python dependencies
pip install -r requirements.txt

# Make the script executable
chmod +x bloodrecon.py

# Run the tool
python bloodrecon.py --interactive

Termux Installation

# Update packages and install dependencies
pkg update && pkg upgrade
pkg install git python

# Clone the repository
git clone https://github.com/VritraSecz/BloodRecon.git

# Navigate to the project directory
cd BloodRecon

# Install Python dependencies
pip install -r requirements.txt

# Run the tool
python bloodrecon.py --interactive

Dependencies

BloodRecon requires the following Python packages:

colorama==0.4.6
dnspython==2.7.0
mmh3==5.1.0
phonenumbers==9.0.10
Pillow==11.3.0
requests==2.32.4
shodan==1.31.0
urllib3==2.5.0
whois==1.20240129.2

πŸš€ Usage

Interactive Mode

Launch BloodRecon in interactive mode for a user-friendly menu experience:

python bloodrecon.py --interactive

Command Line Usage

BloodRecon supports extensive command-line options for automation and scripting:

Basic Usage Examples

# IP Address Analysis
python bloodrecon.py --ip 8.8.8.8

# Domain WHOIS Lookup
python bloodrecon.py --whois example.com

# DNS Records Analysis
python bloodrecon.py --dns google.com

# HTTP Headers Analysis
python bloodrecon.py --headers https://example.com

# Social Media Username Check
python bloodrecon.py --social username123

# Email Validation
python bloodrecon.py --email test@example.com

# Phone Number Intelligence
python bloodrecon.py --phone +1234567890

# Shodan Intelligence Lookup
python bloodrecon.py --shodan 8.8.8.8

Advanced Usage Examples

# Google Dorking
python bloodrecon.py --dork "site:example.com filetype:pdf"

# Subdomain Discovery
python bloodrecon.py --subdomains example.com

# SSL Certificate Analysis
python bloodrecon.py --ssl example.com:443

# Directory Bruteforcing
python bloodrecon.py --dir-brute https://example.com

# JavaScript Endpoint Scanner
python bloodrecon.py --js-endpoints https://example.com

# IP Range Scanner
python bloodrecon.py --ip-scan 192.168.1.0/24

# Wayback Machine Search
python bloodrecon.py --wayback example.com

# GitHub Intelligence
python bloodrecon.py --github octocat

Tool Information

# Display detailed tool information
python bloodrecon.py --about

# Show developer contact information
python bloodrecon.py --connect

# Show version
python bloodrecon.py --version

# Display help
python bloodrecon.py --help

πŸ”§ Modules

BloodRecon features 34+ specialized OSINT modules organized into categories:

Network & Infrastructure

Module Description Usage Example
🌐 IP Lookup Comprehensive IP address intelligence including geolocation, ISP, ASN --ip 8.8.8.8
πŸ” WHOIS Lookup Domain registration information and ownership details --whois example.com
πŸ“‹ DNS Lookup DNS records analysis (A, AAAA, MX, TXT, NS) --dns google.com
πŸ”„ Reverse DNS Reverse DNS lookup for IP addresses --reverse 8.8.8.8
πŸ”Œ Port Scanner Network port scanning and service detection --ports 192.168.1.1
πŸ” SSL Scanner SSL/TLS certificate analysis and security assessment --ssl example.com:443
🌍 IP Range Scanner Scan IP ranges for active hosts --ip-scan 192.168.1.0/24
🏒 ASN Resolver Resolve ASN numbers to IP ranges --asn AS15169
🌐 ISP Tracker Track IP addresses to ISP information --isp 8.8.8.8

Web Application Security

Module Description Usage Example
πŸ“„ HTTP Headers HTTP security headers analysis --headers https://example.com
πŸ€– Robots Scanner Robots.txt file analysis and discovery --robots https://example.com
πŸ“ Directory Bruteforce Web directory and file discovery --dir-brute https://example.com
πŸ—ΊοΈ Sitemap Parser XML sitemap parsing and analysis --sitemap https://example.com
⚑ JS Endpoint Scanner JavaScript file analysis for API endpoints --js-endpoints https://example.com
🎨 Favicon Hash Generate favicon hashes for fingerprinting --favicon https://example.com
πŸ”§ Tech Fingerprint Web technology stack identification --tech https://example.com
πŸ” URL Analyzer URL threat analysis and reputation check --url https://suspicious-site.com
🌐 User-Agent Detector User-Agent string analysis and detection --useragent "Mozilla/5.0..."

Social Media & Personal Intel

Module Description Usage Example
πŸ‘₯ Social Checker Username availability across social platforms --social johndoe
πŸ™ GitHub Intel GitHub user and repository intelligence --github octocat
πŸ“± Phone Intel Phone number intelligence and carrier info --phone +1234567890
πŸ“§ Email Validator Email address validation and domain analysis --email test@example.com
πŸ—‘οΈ Temp Email Checker Temporary/disposable email detection --temp-email test@tempmail.com

Document & Metadata Analysis

Module Description Usage Example
πŸ“· EXIF Extractor Image metadata and EXIF data extraction --exif image.jpg
πŸ“„ Doc Metadata Document metadata extraction (PDF, DOCX, etc.) --metadata document.pdf

Search & Discovery

Module Description Usage Example
πŸ” Google Dorking Advanced Google search queries --dork "site:example.com filetype:pdf"
🌐 Subdomain Finder Subdomain discovery and enumeration --subdomains example.com
⏰ Wayback Machine Historical website data from Internet Archive --wayback example.com
πŸ•·οΈ Common Crawl Search Common Crawl web archive data --common-crawl example.com
πŸ“‹ Pastebin Search Search Pastebin for data dumps and leaks --pastebin searchterm
πŸ’Ύ Leak Search Data breach and leak detection --leak email@example.com
πŸ“‚ Google Drive Leaks Search for leaked Google Drive files --gdrive folderID
πŸ—ΊοΈ Maps Parser Parse and analyze Google Maps links --maps "https://maps.google.com/..."

Threat Intelligence

Module Description Usage Example
πŸ›‘οΈ Shodan Lookup Shodan API integration for host intelligence --shodan 8.8.8.8

πŸ”‘ API Key Configuration

Some modules require API keys for enhanced functionality. BloodRecon now offers multiple convenient ways to configure your API keys:

Shodan API Key

πŸš€ Recommended Method: Command Line Setup (v1.2.0+)

  1. Get your free API key at Shodan.io
  2. Set it instantly with one command:
# Set your Shodan API key (replaces any existing key)
python3 bloodrecon.py --shodan-api "your_shodan_api_key_here"
  1. Start using Shodan immediately:
# Your API key is now saved and ready to use!
python3 bloodrecon.py --shodan 8.8.8.8
python3 bloodrecon.py --shodan google.com

πŸ“ Configuration Details

  • Storage Location: ~/.config-vritrasecz/bloodrecon-shodan.json
  • Auto Directory Creation: Config directories are created automatically
  • Key Replacement: New keys seamlessly replace existing ones
  • Persistent Storage: API key is saved for all future sessions

πŸ”„ Alternative Methods

Environment Variable:

export SHODAN_API_KEY="your_api_key_here"
python3 bloodrecon.py --shodan 8.8.8.8

Legacy config.py (still supported):

# modules/config.py
SHODAN_API_KEY = 'your_shodan_api_key_here'

Interactive Mode:

  • The tool will prompt for the key if not configured
  • Entered keys are automatically saved for future use

API Key Security

πŸ”’ Security Best Practices:

  • βœ… Use the --shodan-api command for secure local storage
  • βœ… Use environment variables for server deployments
  • ❌ Never commit API keys to version control
  • ❌ Avoid hardcoding keys in scripts

πŸ’‘ Pro Tip: The new JSON config system in v1.2.0 provides the most reliable and user-friendly API key management!


πŸ“Έ Screenshots

Interactive Menu

Interactive Menu


πŸ“ Folder Structure

BloodRecon/
β”‚
β”œβ”€β”€ πŸ“„ bloodrecon.py             # Main application file
β”œβ”€β”€ πŸ“„ requirements.txt          # Python dependencies
β”œβ”€β”€ πŸ“„ LICENSE                   # License File
β”œβ”€β”€ πŸ“„ README.md                 # This file
β”œβ”€β”€ πŸ“„ CHANGELOG.md              # Version history and changes
β”‚
└── πŸ“ modules/                  # OSINT modules directory
    β”œβ”€β”€ πŸ“ list-imp/             # Important list
    β”‚   β”œβ”€β”€ πŸ“„ common.txt        # Password list for Dir Bruteforce
    β”‚   └── πŸ“„ temp-domains.txt  # Temp mail domain list
    β”‚
    β”œβ”€β”€ πŸ“„ __init__.py           # Module initialization
    β”œβ”€β”€ πŸ“„ colors.py             # Color management and styling
    β”œβ”€β”€ πŸ“„ config.py             # Configuration file (API keys)
    β”‚
    β”œβ”€β”€ 🌐 Network & Infrastructure
    β”œβ”€β”€ πŸ“„ ip_lookup.py          # IP address intelligence
    β”œβ”€β”€ πŸ“„ whois_lookup.py       # WHOIS domain lookup
    β”œβ”€β”€ πŸ“„ dns_lookup.py         # DNS records analysis
    β”œβ”€β”€ πŸ“„ reverse_dns.py        # Reverse DNS lookup
    β”œβ”€β”€ πŸ“„ port_scanner.py       # Port scanning functionality
    β”œβ”€β”€ πŸ“„ ssl_scanner.py        # SSL certificate analysis
    β”œβ”€β”€ πŸ“„ ip_range_scanner.py   # IP range scanning
    β”œβ”€β”€ πŸ“„ asn_resolver.py       # ASN to IP range resolution
    β”œβ”€β”€ πŸ“„ isp_tracker.py        # ISP tracking
    β”‚
    β”œβ”€β”€ πŸ”’ Web Application Security
    β”œβ”€β”€ πŸ“„ http_headers.py       # HTTP headers analysis
    β”œβ”€β”€ πŸ“„ robots_scanner.py     # Robots.txt scanner
    β”œβ”€β”€ πŸ“„ directory_bruteforce.py # Directory bruteforcing
    β”œβ”€β”€ πŸ“„ sitemap_parser.py     # Sitemap analysis
    β”œβ”€β”€ πŸ“„ js_endpoint_scanner.py # JavaScript endpoint discovery
    β”œβ”€β”€ πŸ“„ favicon_hash.py       # Favicon hash generation
    β”œβ”€β”€ πŸ“„ tech_fingerprint.py   # Technology fingerprinting
    β”œβ”€β”€ πŸ“„ url_analyzer.py       # URL threat analysis
    β”œβ”€β”€ πŸ“„ useragent_detector.py # User-Agent analysis
    β”‚
    β”œβ”€β”€ πŸ‘₯ Social & Personal Intel
    β”œβ”€β”€ πŸ“„ social_checker.py     # Social media username check
    β”œβ”€β”€ πŸ“„ github_intel.py       # GitHub intelligence
    β”œβ”€β”€ πŸ“„ phone_intel.py        # Phone number analysis
    β”œβ”€β”€ πŸ“„ email_validator.py    # Email validation
    β”œβ”€β”€ πŸ“„ temp_email_checker.py # Temporary email detection
    β”‚
    β”œβ”€β”€ πŸ“„ Document & Metadata Analysis
    β”œβ”€β”€ πŸ“„ exif_extractor.py     # EXIF metadata extraction
    β”œβ”€β”€ πŸ“„ doc_metadata.py       # Document metadata analysis
    β”‚
    β”œβ”€β”€ πŸ” Search & Discovery
    β”œβ”€β”€ πŸ“„ google_dorking.py     # Google dorking
    β”œβ”€β”€ πŸ“„ subdomain_finder.py   # Subdomain discovery
    β”œβ”€β”€ πŸ“„ wayback_machine.py    # Wayback Machine search
    β”œβ”€β”€ πŸ“„ common_crawl.py       # Common Crawl search
    β”œβ”€β”€ πŸ“„ pastebin_search.py    # Pastebin searching
    β”œβ”€β”€ πŸ“„ leak_search.py        # Data breach search
    β”œβ”€β”€ πŸ“„ google_drive_leaks.py # Google Drive leak search
    β”œβ”€β”€ πŸ“„ maps_parser.py        # Google Maps link parser
    └── πŸ“„ shodan_lookup.py   # Shodan API integration


βš–οΈ Legal Disclaimer

⚠️ IMPORTANT: This tool is designed exclusively for educational purposes and authorized security testing.

βœ… Authorized Uses

  • Educational purposes and learning OSINT techniques
  • Authorized penetration testing and security assessments
  • Bug bounty programs with proper scope authorization
  • Digital forensics investigations by authorized personnel
  • Security research within legal boundaries

❌ Prohibited Uses

  • Unauthorized surveillance or stalking
  • Illegal data collection or privacy violations
  • Malicious reconnaissance or attack preparation
  • Any activity violating local, state, or federal laws

Users are solely responsible for ensuring compliance with applicable laws and regulations in their jurisdiction.


πŸ‘¨β€πŸ’» Author

Alex Butler

Vritra Security Organization

🌐 Connect With Us

  • Creator
  • Website
  • GitHub
  • Instagram
  • YouTube
  • Telegram Channel
  • Main Channel
  • Community
  • Support Bot

🀝 Contributing

Contributions are welcome! Here's how you can help:

  1. 🍴 Fork the repository
  2. 🌿 Create a feature branch (git checkout -b feature/AmazingFeature)
  3. πŸ’Ύ Commit your changes (git commit -m 'Add some AmazingFeature')
  4. πŸ“€ Push to the branch (git push origin feature/AmazingFeature)
  5. πŸ”„ Open a Pull Request

πŸ’‘ Ways to Contribute

  • πŸ› Report bugs and issues
  • πŸ’‘ Suggest new features or modules
  • πŸ“– Improve documentation
  • πŸ”§ Add new OSINT modules
  • πŸ§ͺ Write tests
  • 🌍 Translate to other languages

πŸ“„ License

🏷️ MIT License β€” Permissions, Limitations & Requirements

βœ… Permissions

  • Commercial Use
  • Modification
  • Distribution
  • Private Use

❌ Limitations

  • No Warranty
  • No Liability

⚠️ Requirements

  • License Notice

⭐ If you found BloodRecon useful, please consider giving it a star!

Made with ❀️ by Alex Butler