Skip to main content

Advanced OSINT Intelligence Framework for cybersecurity professionals

Project description

๐Ÿฉธ BloodRecon ๐Ÿฉธ

Python License Platform Version Status Maintained Stars Forks Issues Contributors Languages Code Size

โšก OSINT Intelligence Framework โšก

๐Ÿฉธ Blood is the Key ๐Ÿฉธ

A comprehensive OSINT toolkit for cybersecurity professionals, penetration testers, bug bounty hunters, and digital forensics investigators.


๐ŸŽ‰ What's New in v1.2.0

๐Ÿš€ Enhanced Shodan Integration

We've completely revamped the Shodan integration with powerful new features that make API key management effortless!

โœจ Key Improvements:

๐Ÿ”ง Command Line API Management

# Set your Shodan API key instantly - no more interactive prompts!
python3 bloodrecon.py --shodan-api "your_api_key_here"

๐Ÿ“ Streamlined Configuration

  • New Location: ~/.config-vritrasecz/bloodrecon-shodan.json
  • Auto Directory Creation: Tool creates config directories automatically
  • JSON-Only Storage: Simplified, reliable configuration management

๐Ÿ”’ Smart API Key Handling

  • Automatic Replacement: New API keys seamlessly replace existing ones
  • Input Validation: Enhanced validation prevents empty or invalid keys
  • Better Error Messages: Clear, actionable feedback for users

โšก Improved User Experience

  • One-Command Setup: Get Shodan running with a single command
  • Non-Interactive Mode: Perfect for automation and scripting
  • Cleaner Output: More intuitive and professional interface

๐Ÿ› ๏ธ Quick Setup Example:

# 1. Set your API key (one time setup)
python3 bloodrecon.py --shodan-api "your_shodan_api_key"

# 2. Start using Shodan immediately
python3 bloodrecon.py --shodan 8.8.8.8
python3 bloodrecon.py --shodan google.com

๐Ÿ’ก Pro Tip: Your API key is saved securely and will be used automatically for all future Shodan queries!

๐Ÿ“‹ What Changed:

  • Moved from ~/.osint_shodan_config to organized ~/.config-vritrasecz/ directory
  • Removed dual config.py file management for simplified workflow
  • Enhanced error handling and user feedback
  • Added --shodan-api command line argument

๐Ÿ”— Get Started: View complete changelog โ€ข API Configuration Guide


๐Ÿ“– Table of Contents


๐ŸŽฏ Overview

BloodRecon is a state-of-the-art OSINT (Open Source Intelligence) framework that provides cybersecurity professionals with 34+ specialized modules for comprehensive reconnaissance and intelligence gathering. Built with Python 3.x, it offers both interactive menu-driven and command-line interfaces for maximum flexibility.

โœจ Key Features

๐Ÿ” 34 Specialized OSINT Modules
๐ŸŒ Network & Infrastructure Analysis (IP, DNS, WHOIS, SSL, Ports)
๐Ÿ”’ Web Application Security Testing (Headers, Robots, Directories)
๐Ÿ‘ฅ Social Media & Personal Intelligence (GitHub, Social Platforms)
๐Ÿ“„ Document & Metadata Analysis (EXIF, Document Properties)
๐Ÿ”Ž Advanced Search Capabilities (Google Dorking, Wayback Machine)
๐Ÿ“ž Communication Intelligence (Email, Phone Number Analysis)
๐Ÿ›ก๏ธ Threat Intelligence Integration (Shodan)
๐Ÿ’พ Data Breach & Leak Detection
๐ŸŽจ Interactive CLI Interface with Target Input Examples
๐ŸŒˆ Colored Terminal Output for Enhanced Readability


๐Ÿ› ๏ธ Installation

Linux Installation

# Clone the repository
git clone https://github.com/VritraSecz/BloodRecon.git

# Navigate to the project directory
cd BloodRecon

# Install Python dependencies
pip install -r requirements.txt

# Make the script executable
chmod +x bloodrecon.py

# Run the tool
python bloodrecon.py --interactive

Termux Installation

# Update packages and install dependencies
pkg update && pkg upgrade
pkg install git python

# Clone the repository
git clone https://github.com/VritraSecz/BloodRecon.git

# Navigate to the project directory
cd BloodRecon

# Install Python dependencies
pip install -r requirements.txt

# Run the tool
python bloodrecon.py --interactive

Dependencies

BloodRecon requires the following Python packages:

colorama==0.4.6
dnspython==2.7.0
mmh3==5.1.0
phonenumbers==9.0.10
Pillow==11.3.0
requests==2.32.4
shodan==1.31.0
urllib3==2.5.0
whois==1.20240129.2

๐Ÿš€ Usage

Interactive Mode

Launch BloodRecon in interactive mode for a user-friendly menu experience:

python bloodrecon.py --interactive

Command Line Usage

BloodRecon supports extensive command-line options for automation and scripting:

Basic Usage Examples

# IP Address Analysis
python bloodrecon.py --ip 8.8.8.8

# Domain WHOIS Lookup
python bloodrecon.py --whois example.com

# DNS Records Analysis
python bloodrecon.py --dns google.com

# HTTP Headers Analysis
python bloodrecon.py --headers https://example.com

# Social Media Username Check
python bloodrecon.py --social username123

# Email Validation
python bloodrecon.py --email test@example.com

# Phone Number Intelligence
python bloodrecon.py --phone +1234567890

# Shodan Intelligence Lookup
python bloodrecon.py --shodan 8.8.8.8

Advanced Usage Examples

# Google Dorking
python bloodrecon.py --dork "site:example.com filetype:pdf"

# Subdomain Discovery
python bloodrecon.py --subdomains example.com

# SSL Certificate Analysis
python bloodrecon.py --ssl example.com:443

# Directory Bruteforcing
python bloodrecon.py --dir-brute https://example.com

# JavaScript Endpoint Scanner
python bloodrecon.py --js-endpoints https://example.com

# IP Range Scanner
python bloodrecon.py --ip-scan 192.168.1.0/24

# Wayback Machine Search
python bloodrecon.py --wayback example.com

# GitHub Intelligence
python bloodrecon.py --github octocat

Tool Information

# Display detailed tool information
python bloodrecon.py --about

# Show developer contact information
python bloodrecon.py --connect

# Show version
python bloodrecon.py --version

# Display help
python bloodrecon.py --help

๐Ÿ”ง Modules

BloodRecon features 34+ specialized OSINT modules organized into categories:

Network & Infrastructure

Module Description Usage Example
๐ŸŒ IP Lookup Comprehensive IP address intelligence including geolocation, ISP, ASN --ip 8.8.8.8
๐Ÿ” WHOIS Lookup Domain registration information and ownership details --whois example.com
๐Ÿ“‹ DNS Lookup DNS records analysis (A, AAAA, MX, TXT, NS) --dns google.com
๐Ÿ”„ Reverse DNS Reverse DNS lookup for IP addresses --reverse 8.8.8.8
๐Ÿ”Œ Port Scanner Network port scanning and service detection --ports 192.168.1.1
๐Ÿ” SSL Scanner SSL/TLS certificate analysis and security assessment --ssl example.com:443
๐ŸŒ IP Range Scanner Scan IP ranges for active hosts --ip-scan 192.168.1.0/24
๐Ÿข ASN Resolver Resolve ASN numbers to IP ranges --asn AS15169
๐ŸŒ ISP Tracker Track IP addresses to ISP information --isp 8.8.8.8

Web Application Security

Module Description Usage Example
๐Ÿ“„ HTTP Headers HTTP security headers analysis --headers https://example.com
๐Ÿค– Robots Scanner Robots.txt file analysis and discovery --robots https://example.com
๐Ÿ“ Directory Bruteforce Web directory and file discovery --dir-brute https://example.com
๐Ÿ—บ๏ธ Sitemap Parser XML sitemap parsing and analysis --sitemap https://example.com
โšก JS Endpoint Scanner JavaScript file analysis for API endpoints --js-endpoints https://example.com
๐ŸŽจ Favicon Hash Generate favicon hashes for fingerprinting --favicon https://example.com
๐Ÿ”ง Tech Fingerprint Web technology stack identification --tech https://example.com
๐Ÿ” URL Analyzer URL threat analysis and reputation check --url https://suspicious-site.com
๐ŸŒ User-Agent Detector User-Agent string analysis and detection --useragent "Mozilla/5.0..."

Social Media & Personal Intel

Module Description Usage Example
๐Ÿ‘ฅ Social Checker Username availability across social platforms --social johndoe
๐Ÿ™ GitHub Intel GitHub user and repository intelligence --github octocat
๐Ÿ“ฑ Phone Intel Phone number intelligence and carrier info --phone +1234567890
๐Ÿ“ง Email Validator Email address validation and domain analysis --email test@example.com
๐Ÿ—‘๏ธ Temp Email Checker Temporary/disposable email detection --temp-email test@tempmail.com

Document & Metadata Analysis

Module Description Usage Example
๐Ÿ“ท EXIF Extractor Image metadata and EXIF data extraction --exif image.jpg
๐Ÿ“„ Doc Metadata Document metadata extraction (PDF, DOCX, etc.) --metadata document.pdf

Search & Discovery

Module Description Usage Example
๐Ÿ” Google Dorking Advanced Google search queries --dork "site:example.com filetype:pdf"
๐ŸŒ Subdomain Finder Subdomain discovery and enumeration --subdomains example.com
โฐ Wayback Machine Historical website data from Internet Archive --wayback example.com
๐Ÿ•ท๏ธ Common Crawl Search Common Crawl web archive data --common-crawl example.com
๐Ÿ“‹ Pastebin Search Search Pastebin for data dumps and leaks --pastebin searchterm
๐Ÿ’พ Leak Search Data breach and leak detection --leak email@example.com
๐Ÿ“‚ Google Drive Leaks Search for leaked Google Drive files --gdrive folderID
๐Ÿ—บ๏ธ Maps Parser Parse and analyze Google Maps links --maps "https://maps.google.com/..."

Threat Intelligence

Module Description Usage Example
๐Ÿ›ก๏ธ Shodan Lookup Shodan API integration for host intelligence --shodan 8.8.8.8

๐Ÿ”‘ API Key Configuration

Some modules require API keys for enhanced functionality. BloodRecon now offers multiple convenient ways to configure your API keys:

Shodan API Key

๐Ÿš€ Recommended Method: Command Line Setup (v1.2.0+)

  1. Get your free API key at Shodan.io
  2. Set it instantly with one command:
# Set your Shodan API key (replaces any existing key)
python3 bloodrecon.py --shodan-api "your_shodan_api_key_here"
  1. Start using Shodan immediately:
# Your API key is now saved and ready to use!
python3 bloodrecon.py --shodan 8.8.8.8
python3 bloodrecon.py --shodan google.com

๐Ÿ“ Configuration Details

  • Storage Location: ~/.config-vritrasecz/bloodrecon-shodan.json
  • Auto Directory Creation: Config directories are created automatically
  • Key Replacement: New keys seamlessly replace existing ones
  • Persistent Storage: API key is saved for all future sessions

๐Ÿ”„ Alternative Methods

Environment Variable:

export SHODAN_API_KEY="your_api_key_here"
python3 bloodrecon.py --shodan 8.8.8.8

Legacy config.py (still supported):

# modules/config.py
SHODAN_API_KEY = 'your_shodan_api_key_here'

Interactive Mode:

  • The tool will prompt for the key if not configured
  • Entered keys are automatically saved for future use

API Key Security

๐Ÿ”’ Security Best Practices:

  • โœ… Use the --shodan-api command for secure local storage
  • โœ… Use environment variables for server deployments
  • โŒ Never commit API keys to version control
  • โŒ Avoid hardcoding keys in scripts

๐Ÿ’ก Pro Tip: The new JSON config system in v1.2.0 provides the most reliable and user-friendly API key management!


๐Ÿ“ธ Screenshots

Interactive Menu

Interactive Menu


๐Ÿ“ Folder Structure

BloodRecon/
โ”‚
โ”œโ”€โ”€ ๐Ÿ“„ bloodrecon.py             # Main application file
โ”œโ”€โ”€ ๐Ÿ“„ requirements.txt          # Python dependencies
โ”œโ”€โ”€ ๐Ÿ“„ LICENSE                   # License File
โ”œโ”€โ”€ ๐Ÿ“„ README.md                 # This file
โ”œโ”€โ”€ ๐Ÿ“„ CHANGELOG.md              # Version history and changes
โ”‚
โ””โ”€โ”€ ๐Ÿ“ modules/                  # OSINT modules directory
    โ”œโ”€โ”€ ๐Ÿ“ list-imp/             # Important list
    โ”‚   โ”œโ”€โ”€ ๐Ÿ“„ common.txt        # Password list for Dir Bruteforce
    โ”‚   โ””โ”€โ”€ ๐Ÿ“„ temp-domains.txt  # Temp mail domain list
    โ”‚
    โ”œโ”€โ”€ ๐Ÿ“„ __init__.py           # Module initialization
    โ”œโ”€โ”€ ๐Ÿ“„ colors.py             # Color management and styling
    โ”œโ”€โ”€ ๐Ÿ“„ config.py             # Configuration file (API keys)
    โ”‚
    โ”œโ”€โ”€ ๐ŸŒ Network & Infrastructure
    โ”œโ”€โ”€ ๐Ÿ“„ ip_lookup.py          # IP address intelligence
    โ”œโ”€โ”€ ๐Ÿ“„ whois_lookup.py       # WHOIS domain lookup
    โ”œโ”€โ”€ ๐Ÿ“„ dns_lookup.py         # DNS records analysis
    โ”œโ”€โ”€ ๐Ÿ“„ reverse_dns.py        # Reverse DNS lookup
    โ”œโ”€โ”€ ๐Ÿ“„ port_scanner.py       # Port scanning functionality
    โ”œโ”€โ”€ ๐Ÿ“„ ssl_scanner.py        # SSL certificate analysis
    โ”œโ”€โ”€ ๐Ÿ“„ ip_range_scanner.py   # IP range scanning
    โ”œโ”€โ”€ ๐Ÿ“„ asn_resolver.py       # ASN to IP range resolution
    โ”œโ”€โ”€ ๐Ÿ“„ isp_tracker.py        # ISP tracking
    โ”‚
    โ”œโ”€โ”€ ๐Ÿ”’ Web Application Security
    โ”œโ”€โ”€ ๐Ÿ“„ http_headers.py       # HTTP headers analysis
    โ”œโ”€โ”€ ๐Ÿ“„ robots_scanner.py     # Robots.txt scanner
    โ”œโ”€โ”€ ๐Ÿ“„ directory_bruteforce.py # Directory bruteforcing
    โ”œโ”€โ”€ ๐Ÿ“„ sitemap_parser.py     # Sitemap analysis
    โ”œโ”€โ”€ ๐Ÿ“„ js_endpoint_scanner.py # JavaScript endpoint discovery
    โ”œโ”€โ”€ ๐Ÿ“„ favicon_hash.py       # Favicon hash generation
    โ”œโ”€โ”€ ๐Ÿ“„ tech_fingerprint.py   # Technology fingerprinting
    โ”œโ”€โ”€ ๐Ÿ“„ url_analyzer.py       # URL threat analysis
    โ”œโ”€โ”€ ๐Ÿ“„ useragent_detector.py # User-Agent analysis
    โ”‚
    โ”œโ”€โ”€ ๐Ÿ‘ฅ Social & Personal Intel
    โ”œโ”€โ”€ ๐Ÿ“„ social_checker.py     # Social media username check
    โ”œโ”€โ”€ ๐Ÿ“„ github_intel.py       # GitHub intelligence
    โ”œโ”€โ”€ ๐Ÿ“„ phone_intel.py        # Phone number analysis
    โ”œโ”€โ”€ ๐Ÿ“„ email_validator.py    # Email validation
    โ”œโ”€โ”€ ๐Ÿ“„ temp_email_checker.py # Temporary email detection
    โ”‚
    โ”œโ”€โ”€ ๐Ÿ“„ Document & Metadata Analysis
    โ”œโ”€โ”€ ๐Ÿ“„ exif_extractor.py     # EXIF metadata extraction
    โ”œโ”€โ”€ ๐Ÿ“„ doc_metadata.py       # Document metadata analysis
    โ”‚
    โ”œโ”€โ”€ ๐Ÿ” Search & Discovery
    โ”œโ”€โ”€ ๐Ÿ“„ google_dorking.py     # Google dorking
    โ”œโ”€โ”€ ๐Ÿ“„ subdomain_finder.py   # Subdomain discovery
    โ”œโ”€โ”€ ๐Ÿ“„ wayback_machine.py    # Wayback Machine search
    โ”œโ”€โ”€ ๐Ÿ“„ common_crawl.py       # Common Crawl search
    โ”œโ”€โ”€ ๐Ÿ“„ pastebin_search.py    # Pastebin searching
    โ”œโ”€โ”€ ๐Ÿ“„ leak_search.py        # Data breach search
    โ”œโ”€โ”€ ๐Ÿ“„ google_drive_leaks.py # Google Drive leak search
    โ”œโ”€โ”€ ๐Ÿ“„ maps_parser.py        # Google Maps link parser
    โ””โ”€โ”€ ๐Ÿ“„ shodan_lookup.py   # Shodan API integration

โš–๏ธ Legal Disclaimer

โš ๏ธ IMPORTANT: This tool is designed exclusively for educational purposes and authorized security testing.

โœ… Authorized Uses

  • Educational purposes and learning OSINT techniques
  • Authorized penetration testing and security assessments
  • Bug bounty programs with proper scope authorization
  • Digital forensics investigations by authorized personnel
  • Security research within legal boundaries

โŒ Prohibited Uses

  • Unauthorized surveillance or stalking
  • Illegal data collection or privacy violations
  • Malicious reconnaissance or attack preparation
  • Any activity violating local, state, or federal laws

Users are solely responsible for ensuring compliance with applicable laws and regulations in their jurisdiction.


๐Ÿ‘จโ€๐Ÿ’ป Author

Alex Butler

Vritra Security Organization

๐ŸŒ Connect With Us

  • Creator
  • Website
  • GitHub
  • Instagram
  • YouTube
  • Telegram Channel
  • Main Channel
  • Community
  • Support Bot

๐Ÿค Contributing

Contributions are welcome! Here's how you can help:

  1. ๐Ÿด Fork the repository
  2. ๐ŸŒฟ Create a feature branch (git checkout -b feature/AmazingFeature)
  3. ๐Ÿ’พ Commit your changes (git commit -m 'Add some AmazingFeature')
  4. ๐Ÿ“ค Push to the branch (git push origin feature/AmazingFeature)
  5. ๐Ÿ”„ Open a Pull Request

๐Ÿ’ก Ways to Contribute

  • ๐Ÿ› Report bugs and issues
  • ๐Ÿ’ก Suggest new features or modules
  • ๐Ÿ“– Improve documentation
  • ๐Ÿ”ง Add new OSINT modules
  • ๐Ÿงช Write tests
  • ๐ŸŒ Translate to other languages

๐Ÿ“„ License

๐Ÿท๏ธ MIT License โ€” Permissions, Limitations & Requirements

โœ… Permissions

  • Commercial Use
  • Modification
  • Distribution
  • Private Use

โŒ Limitations

  • No Warranty
  • No Liability

โš ๏ธ Requirements

  • License Notice

โญ If you found BloodRecon useful, please consider giving it a star!

Made with โค๏ธ by Alex Butler

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

bloodrecon-1.2.1.tar.gz (132.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

bloodrecon-1.2.1-py3-none-any.whl (145.3 kB view details)

Uploaded Python 3

File details

Details for the file bloodrecon-1.2.1.tar.gz.

File metadata

  • Download URL: bloodrecon-1.2.1.tar.gz
  • Upload date:
  • Size: 132.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.5

File hashes

Hashes for bloodrecon-1.2.1.tar.gz
Algorithm Hash digest
SHA256 15e99c0dbe73b725d82ee765bb6a27b6f79ed2956eb5d86c744dd867a897b9e6
MD5 b01fc5d0dd19a463e8169c0e26508898
BLAKE2b-256 22c18c70fa5beb8559db5bf035e1070be60d307fafd4d423520a6a8ba7ba1ec2

See more details on using hashes here.

File details

Details for the file bloodrecon-1.2.1-py3-none-any.whl.

File metadata

  • Download URL: bloodrecon-1.2.1-py3-none-any.whl
  • Upload date:
  • Size: 145.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.5

File hashes

Hashes for bloodrecon-1.2.1-py3-none-any.whl
Algorithm Hash digest
SHA256 0ab6aa8ca0b60fa6e55c3f767c91581405720c85156abe5e4d43c2f928db5eb2
MD5 947fdb68277a3e6587c980aa27220c41
BLAKE2b-256 b930cc73c07e6473f878cd8ce26bd85cbff464a3e9da561ab65d18c2264c48ab

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page