Skip to main content

Elite Cyber Intelligence & Digital Forensics Platform - Next-generation OSINT framework

Project description

xPOURY4 Recon - Elite Cyber Intelligence & Digital Forensics Platform

Python Version PyPI Version PyPI Downloads License Version

xPOURY4 Recon is a next-generation OSINT (Open Source Intelligence) framework engineered for cybersecurity professionals, digital investigators, and ethical hackers. This elite platform automates comprehensive intelligence gathering and correlation analysis across multiple attack vectors including GitHub, domains, telecommunications, professional networks, and global internet infrastructure.

โšก Quick Start

Get started in seconds with PyPI:

# Install the package
pip install xPOURY4-recon

# Run the tool
xpoury4-recon

# Or launch web interface
xpoury4-recon --web

๐Ÿš€ Features

Core Intelligence Modules

  • ๐Ÿ™ GitHub Intelligence: Deep-dive developer profiling, repository forensics, and organizational mapping
  • ๐ŸŒ Domain Forensics: Advanced WHOIS intelligence, subdomain discovery, and infrastructure analysis
  • ๐Ÿ“ฑ Telecommunications Intelligence: Carrier identification, geolocation tracking, and telecom infrastructure mapping
  • ๐Ÿ’ผ Professional Network Intelligence: Strategic LinkedIn reconnaissance and corporate intelligence gathering
  • ๐Ÿ” Cyber Asset Discovery: Internet-wide device enumeration, vulnerability assessment, and threat intelligence
  • ๐ŸŽฏ Unified Intelligence Operations: Multi-vector correlation analysis with automated threat intelligence synthesis

Technical Features

  • โšก Asynchronous Processing: High-performance async/await implementation
  • ๐ŸŒ Modern Web UI: Beautiful, responsive web interface with real-time updates
  • ๐Ÿ“Š Advanced Logging: Comprehensive logging system with multiple output formats
  • โš™๏ธ Flexible Configuration: YAML-based configuration with environment variable support
  • ๐Ÿ”’ Security Focused: Input validation, rate limiting, and secure API handling
  • ๐Ÿ“ˆ Performance Optimized: Concurrent processing and intelligent caching

๐Ÿ“ฆ Installation

๐Ÿš€ PyPI Installation (Recommended)

Install directly from PyPI with a single command:

# Basic installation
pip install xPOURY4-recon

# With web interface support
pip install xPOURY4-recon[web]

# With development tools
pip install xPOURY4-recon[dev]

# Full installation with all extras
pip install xPOURY4-recon[all]

๐Ÿ› ๏ธ Development Installation

For development or customization:

# Clone the repository
git clone https://github.com/xPOURY4/xPOURY4-recon.git
cd xPOURY4-recon

# Create virtual environment
python -m venv venv
source venv/bin/activate  # On Windows: venv\Scripts\activate

# Install in development mode
pip install -e .

Prerequisites

  • Python 3.8 or higher
  • pip package manager

๐ŸŽฏ Usage

Command Line Interface

After installation via PyPI:

# Interactive CLI mode
xpoury4-recon
# or
xpoury4

# Web interface mode
xpoury4-recon --web

# Show configuration
xpoury4-recon --config

# Show version
xpoury4-recon --version

Development Usage

If installed from source:

# Interactive CLI mode
python main.py

# Web interface mode
python main.py --web

# Show configuration
python main.py --config

# Show version
python main.py --version

Web Interface

Launch the web interface for a modern, user-friendly experience:

# PyPI installation
xpoury4-recon --web

# Development installation
python main.py --web

Then open your browser to http://localhost:5000

CLI Examples

GitHub Reconnaissance

# PyPI installation
xpoury4-recon
# Select option 1 and enter username

# Development installation
python main.py
# Select option 1 and enter username

Domain Analysis

# PyPI installation
xpoury4-recon
# Select option 2 and enter domain

# Development installation
python main.py
# Select option 2 and enter domain

Phone Number OSINT

# PyPI installation
xpoury4-recon
# Select option 3 and enter phone number with country code

# Development installation
python main.py
# Select option 3 and enter phone number with country code

โš™๏ธ Configuration

API Keys Setup

Create a config.yaml file or set environment variables:

api_keys:
  github_token: "your_github_token_here"
  shodan_api_key: "your_shodan_api_key_here"
  virustotal_api_key: "your_virustotal_api_key_here"

settings:
  timeout: 30
  max_retries: 3
  rate_limit_delay: 1.0
  save_results: true
  results_directory: "results"

web_ui:
  host: "127.0.0.1"
  port: 5000
  debug: false

Environment Variables

export GITHUB_TOKEN="your_github_token"
export SHODAN_API_KEY="your_shodan_key"
export VIRUSTOTAL_API_KEY="your_virustotal_key"

๐Ÿ—๏ธ Project Structure

xPOURY4-recon/
โ”œโ”€โ”€ xPOURY4_recon/
โ”‚   โ”œโ”€โ”€ core/
โ”‚   โ”‚   โ”œโ”€โ”€ __init__.py
โ”‚   โ”‚   โ”œโ”€โ”€ config_manager.py
โ”‚   โ”‚   โ”œโ”€โ”€ exceptions.py
โ”‚   โ”‚   โ”œโ”€โ”€ logger.py
โ”‚   โ”‚   โ””โ”€โ”€ recon_engine.py
โ”‚   โ”œโ”€โ”€ modules/
โ”‚   โ”‚   โ”œโ”€โ”€ __init__.py
โ”‚   โ”‚   โ”œโ”€โ”€ base_module.py
โ”‚   โ”‚   โ”œโ”€โ”€ github_recon.py
โ”‚   โ”‚   โ”œโ”€โ”€ domain_recon.py
โ”‚   โ”‚   โ”œโ”€โ”€ phone_recon.py
โ”‚   โ”‚   โ”œโ”€โ”€ linkedin_recon.py
โ”‚   โ”‚   โ””โ”€โ”€ shodan_recon.py
โ”‚   โ”œโ”€โ”€ web/
โ”‚   โ”‚   โ”œโ”€โ”€ __init__.py
โ”‚   โ”‚   โ”œโ”€โ”€ app.py
โ”‚   โ”‚   โ””โ”€โ”€ templates/
โ”‚   โ”œโ”€โ”€ main.py
โ”‚   โ””โ”€โ”€ __init__.py
โ”œโ”€โ”€ main.py
โ”œโ”€โ”€ requirements.txt
โ”œโ”€โ”€ setup.py
โ”œโ”€โ”€ pyproject.toml
โ”œโ”€โ”€ config.yaml
โ””โ”€โ”€ README.md

๐Ÿ”ง API Integration

GitHub API

  • Requires personal access token
  • Provides comprehensive user and repository data
  • Includes organization and activity information

Shodan API

  • Network device and service discovery
  • Vulnerability identification
  • Geographic and ISP information

VirusTotal API

  • Domain reputation analysis
  • Subdomain enumeration
  • Malware and threat detection

๐Ÿ“Š Output Formats

JSON Results

{
  "module": "github_recon",
  "timestamp": "2024-01-15T10:30:00",
  "success": true,
  "data": {
    "profile": {...},
    "repositories": [...],
    "statistics": {...}
  }
}

Web Dashboard

  • Real-time investigation progress
  • Interactive result visualization
  • Export capabilities
  • Historical data tracking

๐Ÿ›ก๏ธ Security Considerations

Ethical Usage

  • Only use on authorized targets
  • Respect rate limits and terms of service
  • Follow responsible disclosure practices
  • Comply with local laws and regulations

Data Protection

  • API keys are never logged or exposed
  • Results can be automatically encrypted
  • Configurable data retention policies
  • Secure configuration management

๐Ÿค Contributing

We welcome contributions! Please follow these guidelines:

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing-feature)
  3. Commit your changes (git commit -m 'Add amazing feature')
  4. Push to the branch (git push origin feature/amazing-feature)
  5. Open a Pull Request

Development Guidelines

  • Follow PEP 8 style guidelines
  • Add comprehensive docstrings
  • Include unit tests for new features
  • Update documentation as needed

๐Ÿ“ License

This project is licensed under the MIT License - see the LICENSE file for details.

๐Ÿ™ Acknowledgments

  • Certificate Transparency Logs for subdomain enumeration
  • ThreatCrowd for threat intelligence data
  • Shodan for network device discovery
  • GitHub API for repository and user data
  • VirusTotal for domain reputation analysis

๐Ÿ“ž Support

๐Ÿ”„ Version History

v1.0.1 (Current)

  • ๐Ÿ“š Updated README.md - Enhanced PyPI installation documentation
  • Added Quick Start section for immediate user engagement
  • Improved installation hierarchy (PyPI โ†’ Development)
  • Updated all usage examples for PyPI commands
  • Added PyPI badges and download statistics
  • Enhanced project structure documentation

v1.0.0

  • ๐ŸŽ‰ Published on PyPI - Now available via pip install xPOURY4-recon
  • Complete xPOURY4 branding implementation
  • Enhanced cybersecurity-focused UI with modern color scheme
  • Improved module descriptions and professional terminology
  • Elite cyber intelligence branding and messaging
  • Advanced visual design with animated elements
  • Professional forensics and intelligence capabilities
  • Enhanced user experience with better typography
  • Complete rewrite with modern architecture
  • Asynchronous processing implementation
  • Web UI with real-time updates
  • Enhanced error handling and logging
  • Modular design with plugin architecture
  • Comprehensive configuration management
  • Command-line tools: xpoury4-recon and xpoury4

โš ๏ธ Disclaimer

This tool is intended for educational and authorized testing purposes only. Users are responsible for complying with applicable laws and regulations. The authors are not responsible for any misuse or damage caused by this tool.


Made with โค๏ธ by xPOURY4

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

xpoury4_recon-1.0.1.tar.gz (48.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

xpoury4_recon-1.0.1-py3-none-any.whl (58.9 kB view details)

Uploaded Python 3

File details

Details for the file xpoury4_recon-1.0.1.tar.gz.

File metadata

  • Download URL: xpoury4_recon-1.0.1.tar.gz
  • Upload date:
  • Size: 48.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.2

File hashes

Hashes for xpoury4_recon-1.0.1.tar.gz
Algorithm Hash digest
SHA256 81b12e6172e2d3ad0f3d7612ce15afe6ac788220e4ca36572177be13b81becf6
MD5 43f915d1544d7204b3e49e0069e766f6
BLAKE2b-256 21b888aa634a55923e6bbfdffe908c521327b7a5d746f95c502e7697047ebd42

See more details on using hashes here.

File details

Details for the file xpoury4_recon-1.0.1-py3-none-any.whl.

File metadata

  • Download URL: xpoury4_recon-1.0.1-py3-none-any.whl
  • Upload date:
  • Size: 58.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.2

File hashes

Hashes for xpoury4_recon-1.0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 4063be6e8f4cd33864d70e59b2c96a6c09b4e0a7c3d74a5d48c86bb98337bd5f
MD5 926af45900c7f3a6c7c06b58ae3ea5e9
BLAKE2b-256 2ec3ca1f529cf211f8211c054752eee5bac43d88b7081cf4f6cd2d98c8674b4a

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page