bloodrecon


Namebloodrecon JSON
Version 1.2.1 PyPI version JSON
download
home_pageNone
SummaryAdvanced OSINT Intelligence Framework for cybersecurity professionals
upload_time2025-07-31 21:50:53
maintainerNone
docs_urlNone
authorAlex Butler - Vritra Security Organization
requires_python>=3.7
licenseMIT
keywords osint reconnaissance cybersecurity intelligence framework penetration-testing
VCS
bugtrack_url
requirements colorama dnspython mmh3 phonenumbers Pillow requests shodan urllib3 whois
Travis-CI No Travis.
coveralls test coverage No coveralls.
            <div align="center">

# 🩸 BloodRecon 🩸

[![Python](https://img.shields.io/badge/python-3.7+-blue.svg)](https://www.python.org/downloads/)
[![License](https://img.shields.io/badge/license-MIT-green.svg)](LICENSE)
[![Platform](https://img.shields.io/badge/platform-Linux%20%7C%20Termux-lightgrey.svg)](#compatibility)
[![Version](https://img.shields.io/badge/version-1.2.1-brightgreen.svg)](#overview)
[![Status](https://img.shields.io/badge/status-stable-success.svg)](#overview)
[![Maintained](https://img.shields.io/badge/maintained-yes-green.svg)](#contributing)
[![Stars](https://img.shields.io/github/stars/VritraSecz/BloodRecon?style=social)](https://github.com/VritraSecz/BloodRecon)
[![Forks](https://img.shields.io/github/forks/VritraSecz/BloodRecon?style=social)](https://github.com/VritraSecz/BloodRecon)
[![Issues](https://img.shields.io/github/issues/VritraSecz/BloodRecon)](https://github.com/VritraSecz/BloodRecon/issues)
[![Contributors](https://img.shields.io/github/contributors/VritraSecz/BloodRecon)](https://github.com/VritraSecz/BloodRecon/graphs/contributors)
[![Languages](https://img.shields.io/github/languages/count/VritraSecz/BloodRecon)](https://github.com/VritraSecz/BloodRecon)
[![Code Size](https://img.shields.io/github/languages/code-size/VritraSecz/BloodRecon)](https://github.com/VritraSecz/BloodRecon)

</div>

<div align="center">
  <h3>⚑ OSINT Intelligence Framework ⚑</h3>
  <h4>🩸 Blood is the Key 🩸</h4>
  <p>A comprehensive OSINT toolkit for cybersecurity professionals, penetration testers, bug bounty hunters, and digital forensics investigators.</p>
</div>

---

## πŸŽ‰ What's New in v1.2.0

### πŸš€ Enhanced Shodan Integration

We've completely revamped the Shodan integration with powerful new features that make API key management effortless!

#### ✨ Key Improvements:

**πŸ”§ Command Line API Management**
```bash
# Set your Shodan API key instantly - no more interactive prompts!
python3 bloodrecon.py --shodan-api "your_api_key_here"
```

**πŸ“ Streamlined Configuration**
- **New Location**: `~/.config-vritrasecz/bloodrecon-shodan.json`
- **Auto Directory Creation**: Tool creates config directories automatically
- **JSON-Only Storage**: Simplified, reliable configuration management

**πŸ”’ Smart API Key Handling**
- **Automatic Replacement**: New API keys seamlessly replace existing ones
- **Input Validation**: Enhanced validation prevents empty or invalid keys
- **Better Error Messages**: Clear, actionable feedback for users

**⚑ Improved User Experience**
- **One-Command Setup**: Get Shodan running with a single command
- **Non-Interactive Mode**: Perfect for automation and scripting
- **Cleaner Output**: More intuitive and professional interface

#### πŸ› οΈ Quick Setup Example:
```bash
# 1. Set your API key (one time setup)
python3 bloodrecon.py --shodan-api "your_shodan_api_key"

# 2. Start using Shodan immediately
python3 bloodrecon.py --shodan 8.8.8.8
python3 bloodrecon.py --shodan google.com
```

> πŸ’‘ **Pro Tip**: Your API key is saved securely and will be used automatically for all future Shodan queries!

**πŸ“‹ What Changed:**
- Moved from `~/.osint_shodan_config` to organized `~/.config-vritrasecz/` directory
- Removed dual config.py file management for simplified workflow
- Enhanced error handling and user feedback
- Added `--shodan-api` command line argument

**πŸ”— Get Started**: [View complete changelog](CHANGELOG.md) β€’ [API Configuration Guide](#-api-key-configuration)

---

## πŸ“– Table of Contents

- [🎯 Overview](#-overview)
- [✨ Key Features](#-key-features)
- [πŸ› οΈ Installation](#️-installation)
  - [Linux Installation](#linux-installation)
  - [Termux Installation](#termux-installation)
  - [Dependencies](#dependencies)
- [πŸš€ Usage](#-usage)
  - [Interactive Mode](#interactive-mode)
  - [Command Line Usage](#command-line-usage)
- [πŸ”§ Modules](#-modules)
  - [Network & Infrastructure](#network--infrastructure)
  - [Web Application Security](#web-application-security)
  - [Social Media & Personal Intel](#social-media--personal-intel)
  - [Document & Metadata Analysis](#document--metadata-analysis)
  - [Search & Discovery](#search--discovery)
  - [Communication Intelligence](#communication-intelligence)
  - [Threat Intelligence](#threat-intelligence)
- [πŸ”‘ API Key Configuration](#-api-key-configuration)
- [πŸ“Έ Screenshots](#-screenshots)
- [πŸ“ Folder Structure](#-folder-structure)
- [βš–οΈ Legal Disclaimer](#️-legal-disclaimer)
- [πŸ‘¨β€πŸ’» Author](#-author)
- [🀝 Contributing](#-contributing)
- [πŸ“„ License](#-license)

---

## 🎯 Overview

BloodRecon is a state-of-the-art OSINT (Open Source Intelligence) framework that provides cybersecurity professionals with 34+ specialized modules for comprehensive reconnaissance and intelligence gathering. Built with Python 3.x, it offers both interactive menu-driven and command-line interfaces for maximum flexibility.

## ✨ Key Features

πŸ” **34 Specialized OSINT Modules**  
🌐 **Network & Infrastructure Analysis** (IP, DNS, WHOIS, SSL, Ports)  
πŸ”’ **Web Application Security Testing** (Headers, Robots, Directories)  
πŸ‘₯ **Social Media & Personal Intelligence** (GitHub, Social Platforms)  
πŸ“„ **Document & Metadata Analysis** (EXIF, Document Properties)  
πŸ”Ž **Advanced Search Capabilities** (Google Dorking, Wayback Machine)  
πŸ“ž **Communication Intelligence** (Email, Phone Number Analysis)  
πŸ›‘οΈ **Threat Intelligence Integration** (Shodan)  
πŸ’Ύ **Data Breach & Leak Detection**  
🎨 **Interactive CLI Interface** with Target Input Examples  
🌈 **Colored Terminal Output** for Enhanced Readability  

---

## πŸ› οΈ Installation

### Linux Installation

```bash
# Clone the repository
git clone https://github.com/VritraSecz/BloodRecon.git

# Navigate to the project directory
cd BloodRecon

# Install Python dependencies
pip install -r requirements.txt

# Make the script executable
chmod +x bloodrecon.py

# Run the tool
python bloodrecon.py --interactive
```

### Termux Installation

```bash
# Update packages and install dependencies
pkg update && pkg upgrade
pkg install git python

# Clone the repository
git clone https://github.com/VritraSecz/BloodRecon.git

# Navigate to the project directory
cd BloodRecon

# Install Python dependencies
pip install -r requirements.txt

# Run the tool
python bloodrecon.py --interactive
```

### Dependencies

BloodRecon requires the following Python packages:

```text
colorama==0.4.6
dnspython==2.7.0
mmh3==5.1.0
phonenumbers==9.0.10
Pillow==11.3.0
requests==2.32.4
shodan==1.31.0
urllib3==2.5.0
whois==1.20240129.2
```

---

## πŸš€ Usage

### Interactive Mode

Launch BloodRecon in interactive mode for a user-friendly menu experience:

```bash
python bloodrecon.py --interactive
```

### Command Line Usage

BloodRecon supports extensive command-line options for automation and scripting:

#### Basic Usage Examples

```bash
# IP Address Analysis
python bloodrecon.py --ip 8.8.8.8

# Domain WHOIS Lookup
python bloodrecon.py --whois example.com

# DNS Records Analysis
python bloodrecon.py --dns google.com

# HTTP Headers Analysis
python bloodrecon.py --headers https://example.com

# Social Media Username Check
python bloodrecon.py --social username123

# Email Validation
python bloodrecon.py --email test@example.com

# Phone Number Intelligence
python bloodrecon.py --phone +1234567890

# Shodan Intelligence Lookup
python bloodrecon.py --shodan 8.8.8.8
```

#### Advanced Usage Examples

```bash
# Google Dorking
python bloodrecon.py --dork "site:example.com filetype:pdf"

# Subdomain Discovery
python bloodrecon.py --subdomains example.com

# SSL Certificate Analysis
python bloodrecon.py --ssl example.com:443

# Directory Bruteforcing
python bloodrecon.py --dir-brute https://example.com

# JavaScript Endpoint Scanner
python bloodrecon.py --js-endpoints https://example.com

# IP Range Scanner
python bloodrecon.py --ip-scan 192.168.1.0/24

# Wayback Machine Search
python bloodrecon.py --wayback example.com

# GitHub Intelligence
python bloodrecon.py --github octocat
```

#### Tool Information

```bash
# Display detailed tool information
python bloodrecon.py --about

# Show developer contact information
python bloodrecon.py --connect

# Show version
python bloodrecon.py --version

# Display help
python bloodrecon.py --help
```

---

## πŸ”§ Modules

BloodRecon features 34+ specialized OSINT modules organized into categories:

### Network & Infrastructure

| Module | Description | Usage Example |
|--------|-------------|---------------|
| 🌐 **IP Lookup** | Comprehensive IP address intelligence including geolocation, ISP, ASN | `--ip 8.8.8.8` |
| πŸ” **WHOIS Lookup** | Domain registration information and ownership details | `--whois example.com` |
| πŸ“‹ **DNS Lookup** | DNS records analysis (A, AAAA, MX, TXT, NS) | `--dns google.com` |
| πŸ”„ **Reverse DNS** | Reverse DNS lookup for IP addresses | `--reverse 8.8.8.8` |
| πŸ”Œ **Port Scanner** | Network port scanning and service detection | `--ports 192.168.1.1` |
| πŸ” **SSL Scanner** | SSL/TLS certificate analysis and security assessment | `--ssl example.com:443` |
| 🌍 **IP Range Scanner** | Scan IP ranges for active hosts | `--ip-scan 192.168.1.0/24` |
| 🏒 **ASN Resolver** | Resolve ASN numbers to IP ranges | `--asn AS15169` |
| 🌐 **ISP Tracker** | Track IP addresses to ISP information | `--isp 8.8.8.8` |

### Web Application Security

| Module | Description | Usage Example |
|--------|-------------|---------------|
| πŸ“„ **HTTP Headers** | HTTP security headers analysis | `--headers https://example.com` |
| πŸ€– **Robots Scanner** | Robots.txt file analysis and discovery | `--robots https://example.com` |
| πŸ“ **Directory Bruteforce** | Web directory and file discovery | `--dir-brute https://example.com` |
| πŸ—ΊοΈ **Sitemap Parser** | XML sitemap parsing and analysis | `--sitemap https://example.com` |
| ⚑ **JS Endpoint Scanner** | JavaScript file analysis for API endpoints | `--js-endpoints https://example.com` |
| 🎨 **Favicon Hash** | Generate favicon hashes for fingerprinting | `--favicon https://example.com` |
| πŸ”§ **Tech Fingerprint** | Web technology stack identification | `--tech https://example.com` |
| πŸ” **URL Analyzer** | URL threat analysis and reputation check | `--url https://suspicious-site.com` |
| 🌐 **User-Agent Detector** | User-Agent string analysis and detection | `--useragent "Mozilla/5.0..."` |

### Social Media & Personal Intel

| Module | Description | Usage Example |
|--------|-------------|---------------|
| πŸ‘₯ **Social Checker** | Username availability across social platforms | `--social johndoe` |
| πŸ™ **GitHub Intel** | GitHub user and repository intelligence | `--github octocat` |
| πŸ“± **Phone Intel** | Phone number intelligence and carrier info | `--phone +1234567890` |
| πŸ“§ **Email Validator** | Email address validation and domain analysis | `--email test@example.com` |
| πŸ—‘οΈ **Temp Email Checker** | Temporary/disposable email detection | `--temp-email test@tempmail.com` |

### Document & Metadata Analysis

| Module | Description | Usage Example |
|--------|-------------|---------------|
| πŸ“· **EXIF Extractor** | Image metadata and EXIF data extraction | `--exif image.jpg` |
| πŸ“„ **Doc Metadata** | Document metadata extraction (PDF, DOCX, etc.) | `--metadata document.pdf` |

### Search & Discovery

| Module | Description | Usage Example |
|--------|-------------|---------------|
| πŸ” **Google Dorking** | Advanced Google search queries | `--dork "site:example.com filetype:pdf"` |
| 🌐 **Subdomain Finder** | Subdomain discovery and enumeration | `--subdomains example.com` |
| ⏰ **Wayback Machine** | Historical website data from Internet Archive | `--wayback example.com` |
| πŸ•·οΈ **Common Crawl** | Search Common Crawl web archive data | `--common-crawl example.com` |
| πŸ“‹ **Pastebin Search** | Search Pastebin for data dumps and leaks | `--pastebin searchterm` |
| πŸ’Ύ **Leak Search** | Data breach and leak detection | `--leak email@example.com` |
| πŸ“‚ **Google Drive Leaks** | Search for leaked Google Drive files | `--gdrive folderID` |
| πŸ—ΊοΈ **Maps Parser** | Parse and analyze Google Maps links | `--maps "https://maps.google.com/..."` |

### Threat Intelligence

| Module | Description | Usage Example |
|--------|-------------|---------------|
| πŸ›‘οΈ **Shodan Lookup** | Shodan API integration for host intelligence | `--shodan 8.8.8.8` |

---

## πŸ”‘ API Key Configuration

Some modules require API keys for enhanced functionality. BloodRecon now offers multiple convenient ways to configure your API keys:

### Shodan API Key

#### πŸš€ **Recommended Method: Command Line Setup (v1.2.0+)**

1. **Get your free API key** at [Shodan.io](https://account.shodan.io/register)
2. **Set it instantly with one command**:

```bash
# Set your Shodan API key (replaces any existing key)
python3 bloodrecon.py --shodan-api "your_shodan_api_key_here"
```

3. **Start using Shodan immediately**:

```bash
# Your API key is now saved and ready to use!
python3 bloodrecon.py --shodan 8.8.8.8
python3 bloodrecon.py --shodan google.com
```

#### πŸ“ **Configuration Details**
- **Storage Location**: `~/.config-vritrasecz/bloodrecon-shodan.json`
- **Auto Directory Creation**: Config directories are created automatically
- **Key Replacement**: New keys seamlessly replace existing ones
- **Persistent Storage**: API key is saved for all future sessions

#### πŸ”„ **Alternative Methods**

**Environment Variable:**
```bash
export SHODAN_API_KEY="your_api_key_here"
python3 bloodrecon.py --shodan 8.8.8.8
```

**Legacy config.py (still supported):**
```python
# modules/config.py
SHODAN_API_KEY = 'your_shodan_api_key_here'
```

**Interactive Mode:**
- The tool will prompt for the key if not configured
- Entered keys are automatically saved for future use

### API Key Security

πŸ”’ **Security Best Practices**:
- βœ… Use the `--shodan-api` command for secure local storage
- βœ… Use environment variables for server deployments
- ❌ Never commit API keys to version control
- ❌ Avoid hardcoding keys in scripts

πŸ’‘ **Pro Tip**: The new JSON config system in v1.2.0 provides the most reliable and user-friendly API key management!

---

## πŸ“Έ Screenshots

### Interactive Menu
![Interactive Menu](https://i.ibb.co/bjQZ3xfc/Screenshot-From-2025-07-28-01-46-15.png)

---

## πŸ“ Folder Structure

```plaintext
BloodRecon/
β”‚
β”œβ”€β”€ πŸ“„ bloodrecon.py             # Main application file
β”œβ”€β”€ πŸ“„ requirements.txt          # Python dependencies
β”œβ”€β”€ πŸ“„ LICENSE                   # License File
β”œβ”€β”€ πŸ“„ README.md                 # This file
β”œβ”€β”€ πŸ“„ CHANGELOG.md              # Version history and changes
β”‚
└── πŸ“ modules/                  # OSINT modules directory
    β”œβ”€β”€ πŸ“ list-imp/             # Important list
    β”‚   β”œβ”€β”€ πŸ“„ common.txt        # Password list for Dir Bruteforce
    β”‚   └── πŸ“„ temp-domains.txt  # Temp mail domain list
    β”‚
    β”œβ”€β”€ πŸ“„ __init__.py           # Module initialization
    β”œβ”€β”€ πŸ“„ colors.py             # Color management and styling
    β”œβ”€β”€ πŸ“„ config.py             # Configuration file (API keys)
    β”‚
    β”œβ”€β”€ 🌐 Network & Infrastructure
    β”œβ”€β”€ πŸ“„ ip_lookup.py          # IP address intelligence
    β”œβ”€β”€ πŸ“„ whois_lookup.py       # WHOIS domain lookup
    β”œβ”€β”€ πŸ“„ dns_lookup.py         # DNS records analysis
    β”œβ”€β”€ πŸ“„ reverse_dns.py        # Reverse DNS lookup
    β”œβ”€β”€ πŸ“„ port_scanner.py       # Port scanning functionality
    β”œβ”€β”€ πŸ“„ ssl_scanner.py        # SSL certificate analysis
    β”œβ”€β”€ πŸ“„ ip_range_scanner.py   # IP range scanning
    β”œβ”€β”€ πŸ“„ asn_resolver.py       # ASN to IP range resolution
    β”œβ”€β”€ πŸ“„ isp_tracker.py        # ISP tracking
    β”‚
    β”œβ”€β”€ πŸ”’ Web Application Security
    β”œβ”€β”€ πŸ“„ http_headers.py       # HTTP headers analysis
    β”œβ”€β”€ πŸ“„ robots_scanner.py     # Robots.txt scanner
    β”œβ”€β”€ πŸ“„ directory_bruteforce.py # Directory bruteforcing
    β”œβ”€β”€ πŸ“„ sitemap_parser.py     # Sitemap analysis
    β”œβ”€β”€ πŸ“„ js_endpoint_scanner.py # JavaScript endpoint discovery
    β”œβ”€β”€ πŸ“„ favicon_hash.py       # Favicon hash generation
    β”œβ”€β”€ πŸ“„ tech_fingerprint.py   # Technology fingerprinting
    β”œβ”€β”€ πŸ“„ url_analyzer.py       # URL threat analysis
    β”œβ”€β”€ πŸ“„ useragent_detector.py # User-Agent analysis
    β”‚
    β”œβ”€β”€ πŸ‘₯ Social & Personal Intel
    β”œβ”€β”€ πŸ“„ social_checker.py     # Social media username check
    β”œβ”€β”€ πŸ“„ github_intel.py       # GitHub intelligence
    β”œβ”€β”€ πŸ“„ phone_intel.py        # Phone number analysis
    β”œβ”€β”€ πŸ“„ email_validator.py    # Email validation
    β”œβ”€β”€ πŸ“„ temp_email_checker.py # Temporary email detection
    β”‚
    β”œβ”€β”€ πŸ“„ Document & Metadata Analysis
    β”œβ”€β”€ πŸ“„ exif_extractor.py     # EXIF metadata extraction
    β”œβ”€β”€ πŸ“„ doc_metadata.py       # Document metadata analysis
    β”‚
    β”œβ”€β”€ πŸ” Search & Discovery
    β”œβ”€β”€ πŸ“„ google_dorking.py     # Google dorking
    β”œβ”€β”€ πŸ“„ subdomain_finder.py   # Subdomain discovery
    β”œβ”€β”€ πŸ“„ wayback_machine.py    # Wayback Machine search
    β”œβ”€β”€ πŸ“„ common_crawl.py       # Common Crawl search
    β”œβ”€β”€ πŸ“„ pastebin_search.py    # Pastebin searching
    β”œβ”€β”€ πŸ“„ leak_search.py        # Data breach search
    β”œβ”€β”€ πŸ“„ google_drive_leaks.py # Google Drive leak search
    β”œβ”€β”€ πŸ“„ maps_parser.py        # Google Maps link parser
    └── πŸ“„ shodan_lookup.py   # Shodan API integration

```

---

## βš–οΈ Legal Disclaimer

**⚠️ IMPORTANT**: This tool is designed exclusively for **educational purposes** and **authorized security testing**.

### βœ… Authorized Uses
- Educational purposes and learning OSINT techniques
- Authorized penetration testing and security assessments
- Bug bounty programs with proper scope authorization
- Digital forensics investigations by authorized personnel
- Security research within legal boundaries

### ❌ Prohibited Uses
- Unauthorized surveillance or stalking
- Illegal data collection or privacy violations
- Malicious reconnaissance or attack preparation
- Any activity violating local, state, or federal laws

**Users are solely responsible for ensuring compliance with applicable laws and regulations in their jurisdiction.**

---

## πŸ‘¨β€πŸ’» Author

<div align="center">
  <img src="https://github.com/VritraSecz.png" width="100" height="100" style="border-radius: 50%;">
  <h3>Alex Butler</h3>
  <p><strong>Vritra Security Organization</strong></p>
</div>

### 🌐 Connect With Us

+ [![Creator](https://img.shields.io/badge/Creator-Alex%20%7C%20VritraSec-%23f97316?style=for-the-badge&logo=github)](https://vritrasec.com)
+ [![Website](https://img.shields.io/badge/Website-vritrasec.com-%233b82f6?style=for-the-badge&logo=googlechrome&logoColor=white)](https://vritrasec.com)
+ [![GitHub](https://img.shields.io/badge/GitHub-VritraSecz-%231f2937?style=for-the-badge&logo=github&logoColor=white)](https://github.com/VritraSecz)
+ [![Instagram](https://img.shields.io/badge/Instagram-%40haxorlex-%23E1306C?style=for-the-badge&logo=instagram&logoColor=white)](https://instagram.com/haxorlex)
+ [![YouTube](https://img.shields.io/badge/YouTube-%40Technolex-%23FF0000?style=for-the-badge&logo=youtube&logoColor=white)](https://youtube.com/@Technolex)
+ [![Telegram Channel](https://img.shields.io/badge/Channel-%40LinkCentralX-%2326A5E4?style=for-the-badge&logo=telegram&logoColor=white)](https://t.me/LinkCentralX)
+ [![Main Channel](https://img.shields.io/badge/Main%20Updates-%40VritraSec-%23096AEB?style=for-the-badge&logo=telegram&logoColor=white)](https://t.me/VritraSec)
+ [![Community](https://img.shields.io/badge/Community-%40VritraSecz-%230168C4?style=for-the-badge&logo=telegram&logoColor=white)](https://t.me/VritraSecz)
+ [![Support Bot](https://img.shields.io/badge/Support%20Bot-@ethicxbot-%2363ccff?style=for-the-badge&logo=bot&logoColor=white)](https://t.me/ethicxbot)


---

## 🀝 Contributing

Contributions are welcome! Here's how you can help:

1. 🍴 **Fork the repository**
2. 🌿 **Create a feature branch** (`git checkout -b feature/AmazingFeature`)
3. πŸ’Ύ **Commit your changes** (`git commit -m 'Add some AmazingFeature'`)
4. πŸ“€ **Push to the branch** (`git push origin feature/AmazingFeature`)
5. πŸ”„ **Open a Pull Request**

### πŸ’‘ Ways to Contribute
- πŸ› Report bugs and issues
- πŸ’‘ Suggest new features or modules
- πŸ“– Improve documentation
- πŸ”§ Add new OSINT modules
- πŸ§ͺ Write tests
- 🌍 Translate to other languages



---

## πŸ“„ License


### 🏷️ MIT License β€” Permissions, Limitations & Requirements

#### βœ… Permissions

+ ![Commercial Use](https://img.shields.io/badge/βœ…%20Commercial%20Use-Allowed-brightgreen?style=flat-square&logo=dollar-sign&logoColor=white)
+ ![Modification](https://img.shields.io/badge/βœ…%20Modification-Allowed-brightgreen?style=flat-square&logo=edit&logoColor=white)
+ ![Distribution](https://img.shields.io/badge/βœ…%20Distribution-Allowed-brightgreen?style=flat-square&logo=share&logoColor=white)
+ ![Private Use](https://img.shields.io/badge/βœ…%20Private%20Use-Allowed-brightgreen?style=flat-square&logo=lock&logoColor=white)

#### ❌ Limitations

+ ![No Warranty](https://img.shields.io/badge/❌%20No%20Warranty-Provided-red?style=flat-square&logo=shield-x&logoColor=white)
+ ![No Liability](https://img.shields.io/badge/❌%20No%20Liability-Accepted-red?style=flat-square&logo=alert-triangle&logoColor=white)

#### ⚠️ Requirements

+ ![License Notice](https://img.shields.io/badge/⚠️%20License%20Notice-Required-orange?style=flat-square&logo=document-text&logoColor=white)


---

<div align="center">
  <p>⭐ If you found BloodRecon useful, please consider giving it a star!</p>
  <b>Made with ❀️ by <a href="https://github.com/VritraSecz">Alex Butler</a></b>
</div>






            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "bloodrecon",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.7",
    "maintainer_email": null,
    "keywords": "osint, reconnaissance, cybersecurity, intelligence, framework, penetration-testing",
    "author": "Alex Butler - Vritra Security Organization",
    "author_email": null,
    "download_url": "https://files.pythonhosted.org/packages/22/c1/8c70fa5beb8559db5bf035e1070be60d307fafd4d423520a6a8ba7ba1ec2/bloodrecon-1.2.1.tar.gz",
    "platform": null,
    "description": "<div align=\"center\">\n\n# \ud83e\ude78 BloodRecon \ud83e\ude78\n\n[![Python](https://img.shields.io/badge/python-3.7+-blue.svg)](https://www.python.org/downloads/)\n[![License](https://img.shields.io/badge/license-MIT-green.svg)](LICENSE)\n[![Platform](https://img.shields.io/badge/platform-Linux%20%7C%20Termux-lightgrey.svg)](#compatibility)\n[![Version](https://img.shields.io/badge/version-1.2.1-brightgreen.svg)](#overview)\n[![Status](https://img.shields.io/badge/status-stable-success.svg)](#overview)\n[![Maintained](https://img.shields.io/badge/maintained-yes-green.svg)](#contributing)\n[![Stars](https://img.shields.io/github/stars/VritraSecz/BloodRecon?style=social)](https://github.com/VritraSecz/BloodRecon)\n[![Forks](https://img.shields.io/github/forks/VritraSecz/BloodRecon?style=social)](https://github.com/VritraSecz/BloodRecon)\n[![Issues](https://img.shields.io/github/issues/VritraSecz/BloodRecon)](https://github.com/VritraSecz/BloodRecon/issues)\n[![Contributors](https://img.shields.io/github/contributors/VritraSecz/BloodRecon)](https://github.com/VritraSecz/BloodRecon/graphs/contributors)\n[![Languages](https://img.shields.io/github/languages/count/VritraSecz/BloodRecon)](https://github.com/VritraSecz/BloodRecon)\n[![Code Size](https://img.shields.io/github/languages/code-size/VritraSecz/BloodRecon)](https://github.com/VritraSecz/BloodRecon)\n\n</div>\n\n<div align=\"center\">\n  <h3>\u26a1 OSINT Intelligence Framework \u26a1</h3>\n  <h4>\ud83e\ude78 Blood is the Key \ud83e\ude78</h4>\n  <p>A comprehensive OSINT toolkit for cybersecurity professionals, penetration testers, bug bounty hunters, and digital forensics investigators.</p>\n</div>\n\n---\n\n## \ud83c\udf89 What's New in v1.2.0\n\n### \ud83d\ude80 Enhanced Shodan Integration\n\nWe've completely revamped the Shodan integration with powerful new features that make API key management effortless!\n\n#### \u2728 Key Improvements:\n\n**\ud83d\udd27 Command Line API Management**\n```bash\n# Set your Shodan API key instantly - no more interactive prompts!\npython3 bloodrecon.py --shodan-api \"your_api_key_here\"\n```\n\n**\ud83d\udcc1 Streamlined Configuration**\n- **New Location**: `~/.config-vritrasecz/bloodrecon-shodan.json`\n- **Auto Directory Creation**: Tool creates config directories automatically\n- **JSON-Only Storage**: Simplified, reliable configuration management\n\n**\ud83d\udd12 Smart API Key Handling**\n- **Automatic Replacement**: New API keys seamlessly replace existing ones\n- **Input Validation**: Enhanced validation prevents empty or invalid keys\n- **Better Error Messages**: Clear, actionable feedback for users\n\n**\u26a1 Improved User Experience**\n- **One-Command Setup**: Get Shodan running with a single command\n- **Non-Interactive Mode**: Perfect for automation and scripting\n- **Cleaner Output**: More intuitive and professional interface\n\n#### \ud83d\udee0\ufe0f Quick Setup Example:\n```bash\n# 1. Set your API key (one time setup)\npython3 bloodrecon.py --shodan-api \"your_shodan_api_key\"\n\n# 2. Start using Shodan immediately\npython3 bloodrecon.py --shodan 8.8.8.8\npython3 bloodrecon.py --shodan google.com\n```\n\n> \ud83d\udca1 **Pro Tip**: Your API key is saved securely and will be used automatically for all future Shodan queries!\n\n**\ud83d\udccb What Changed:**\n- Moved from `~/.osint_shodan_config` to organized `~/.config-vritrasecz/` directory\n- Removed dual config.py file management for simplified workflow\n- Enhanced error handling and user feedback\n- Added `--shodan-api` command line argument\n\n**\ud83d\udd17 Get Started**: [View complete changelog](CHANGELOG.md) \u2022 [API Configuration Guide](#-api-key-configuration)\n\n---\n\n## \ud83d\udcd6 Table of Contents\n\n- [\ud83c\udfaf Overview](#-overview)\n- [\u2728 Key Features](#-key-features)\n- [\ud83d\udee0\ufe0f Installation](#\ufe0f-installation)\n  - [Linux Installation](#linux-installation)\n  - [Termux Installation](#termux-installation)\n  - [Dependencies](#dependencies)\n- [\ud83d\ude80 Usage](#-usage)\n  - [Interactive Mode](#interactive-mode)\n  - [Command Line Usage](#command-line-usage)\n- [\ud83d\udd27 Modules](#-modules)\n  - [Network & Infrastructure](#network--infrastructure)\n  - [Web Application Security](#web-application-security)\n  - [Social Media & Personal Intel](#social-media--personal-intel)\n  - [Document & Metadata Analysis](#document--metadata-analysis)\n  - [Search & Discovery](#search--discovery)\n  - [Communication Intelligence](#communication-intelligence)\n  - [Threat Intelligence](#threat-intelligence)\n- [\ud83d\udd11 API Key Configuration](#-api-key-configuration)\n- [\ud83d\udcf8 Screenshots](#-screenshots)\n- [\ud83d\udcc1 Folder Structure](#-folder-structure)\n- [\u2696\ufe0f Legal Disclaimer](#\ufe0f-legal-disclaimer)\n- [\ud83d\udc68\u200d\ud83d\udcbb Author](#-author)\n- [\ud83e\udd1d Contributing](#-contributing)\n- [\ud83d\udcc4 License](#-license)\n\n---\n\n## \ud83c\udfaf Overview\n\nBloodRecon is a state-of-the-art OSINT (Open Source Intelligence) framework that provides cybersecurity professionals with 34+ specialized modules for comprehensive reconnaissance and intelligence gathering. Built with Python 3.x, it offers both interactive menu-driven and command-line interfaces for maximum flexibility.\n\n## \u2728 Key Features\n\n\ud83d\udd0d **34 Specialized OSINT Modules**  \n\ud83c\udf10 **Network & Infrastructure Analysis** (IP, DNS, WHOIS, SSL, Ports)  \n\ud83d\udd12 **Web Application Security Testing** (Headers, Robots, Directories)  \n\ud83d\udc65 **Social Media & Personal Intelligence** (GitHub, Social Platforms)  \n\ud83d\udcc4 **Document & Metadata Analysis** (EXIF, Document Properties)  \n\ud83d\udd0e **Advanced Search Capabilities** (Google Dorking, Wayback Machine)  \n\ud83d\udcde **Communication Intelligence** (Email, Phone Number Analysis)  \n\ud83d\udee1\ufe0f **Threat Intelligence Integration** (Shodan)  \n\ud83d\udcbe **Data Breach & Leak Detection**  \n\ud83c\udfa8 **Interactive CLI Interface** with Target Input Examples  \n\ud83c\udf08 **Colored Terminal Output** for Enhanced Readability  \n\n---\n\n## \ud83d\udee0\ufe0f Installation\n\n### Linux Installation\n\n```bash\n# Clone the repository\ngit clone https://github.com/VritraSecz/BloodRecon.git\n\n# Navigate to the project directory\ncd BloodRecon\n\n# Install Python dependencies\npip install -r requirements.txt\n\n# Make the script executable\nchmod +x bloodrecon.py\n\n# Run the tool\npython bloodrecon.py --interactive\n```\n\n### Termux Installation\n\n```bash\n# Update packages and install dependencies\npkg update && pkg upgrade\npkg install git python\n\n# Clone the repository\ngit clone https://github.com/VritraSecz/BloodRecon.git\n\n# Navigate to the project directory\ncd BloodRecon\n\n# Install Python dependencies\npip install -r requirements.txt\n\n# Run the tool\npython bloodrecon.py --interactive\n```\n\n### Dependencies\n\nBloodRecon requires the following Python packages:\n\n```text\ncolorama==0.4.6\ndnspython==2.7.0\nmmh3==5.1.0\nphonenumbers==9.0.10\nPillow==11.3.0\nrequests==2.32.4\nshodan==1.31.0\nurllib3==2.5.0\nwhois==1.20240129.2\n```\n\n---\n\n## \ud83d\ude80 Usage\n\n### Interactive Mode\n\nLaunch BloodRecon in interactive mode for a user-friendly menu experience:\n\n```bash\npython bloodrecon.py --interactive\n```\n\n### Command Line Usage\n\nBloodRecon supports extensive command-line options for automation and scripting:\n\n#### Basic Usage Examples\n\n```bash\n# IP Address Analysis\npython bloodrecon.py --ip 8.8.8.8\n\n# Domain WHOIS Lookup\npython bloodrecon.py --whois example.com\n\n# DNS Records Analysis\npython bloodrecon.py --dns google.com\n\n# HTTP Headers Analysis\npython bloodrecon.py --headers https://example.com\n\n# Social Media Username Check\npython bloodrecon.py --social username123\n\n# Email Validation\npython bloodrecon.py --email test@example.com\n\n# Phone Number Intelligence\npython bloodrecon.py --phone +1234567890\n\n# Shodan Intelligence Lookup\npython bloodrecon.py --shodan 8.8.8.8\n```\n\n#### Advanced Usage Examples\n\n```bash\n# Google Dorking\npython bloodrecon.py --dork \"site:example.com filetype:pdf\"\n\n# Subdomain Discovery\npython bloodrecon.py --subdomains example.com\n\n# SSL Certificate Analysis\npython bloodrecon.py --ssl example.com:443\n\n# Directory Bruteforcing\npython bloodrecon.py --dir-brute https://example.com\n\n# JavaScript Endpoint Scanner\npython bloodrecon.py --js-endpoints https://example.com\n\n# IP Range Scanner\npython bloodrecon.py --ip-scan 192.168.1.0/24\n\n# Wayback Machine Search\npython bloodrecon.py --wayback example.com\n\n# GitHub Intelligence\npython bloodrecon.py --github octocat\n```\n\n#### Tool Information\n\n```bash\n# Display detailed tool information\npython bloodrecon.py --about\n\n# Show developer contact information\npython bloodrecon.py --connect\n\n# Show version\npython bloodrecon.py --version\n\n# Display help\npython bloodrecon.py --help\n```\n\n---\n\n## \ud83d\udd27 Modules\n\nBloodRecon features 34+ specialized OSINT modules organized into categories:\n\n### Network & Infrastructure\n\n| Module | Description | Usage Example |\n|--------|-------------|---------------|\n| \ud83c\udf10 **IP Lookup** | Comprehensive IP address intelligence including geolocation, ISP, ASN | `--ip 8.8.8.8` |\n| \ud83d\udd0d **WHOIS Lookup** | Domain registration information and ownership details | `--whois example.com` |\n| \ud83d\udccb **DNS Lookup** | DNS records analysis (A, AAAA, MX, TXT, NS) | `--dns google.com` |\n| \ud83d\udd04 **Reverse DNS** | Reverse DNS lookup for IP addresses | `--reverse 8.8.8.8` |\n| \ud83d\udd0c **Port Scanner** | Network port scanning and service detection | `--ports 192.168.1.1` |\n| \ud83d\udd10 **SSL Scanner** | SSL/TLS certificate analysis and security assessment | `--ssl example.com:443` |\n| \ud83c\udf0d **IP Range Scanner** | Scan IP ranges for active hosts | `--ip-scan 192.168.1.0/24` |\n| \ud83c\udfe2 **ASN Resolver** | Resolve ASN numbers to IP ranges | `--asn AS15169` |\n| \ud83c\udf10 **ISP Tracker** | Track IP addresses to ISP information | `--isp 8.8.8.8` |\n\n### Web Application Security\n\n| Module | Description | Usage Example |\n|--------|-------------|---------------|\n| \ud83d\udcc4 **HTTP Headers** | HTTP security headers analysis | `--headers https://example.com` |\n| \ud83e\udd16 **Robots Scanner** | Robots.txt file analysis and discovery | `--robots https://example.com` |\n| \ud83d\udcc1 **Directory Bruteforce** | Web directory and file discovery | `--dir-brute https://example.com` |\n| \ud83d\uddfa\ufe0f **Sitemap Parser** | XML sitemap parsing and analysis | `--sitemap https://example.com` |\n| \u26a1 **JS Endpoint Scanner** | JavaScript file analysis for API endpoints | `--js-endpoints https://example.com` |\n| \ud83c\udfa8 **Favicon Hash** | Generate favicon hashes for fingerprinting | `--favicon https://example.com` |\n| \ud83d\udd27 **Tech Fingerprint** | Web technology stack identification | `--tech https://example.com` |\n| \ud83d\udd0d **URL Analyzer** | URL threat analysis and reputation check | `--url https://suspicious-site.com` |\n| \ud83c\udf10 **User-Agent Detector** | User-Agent string analysis and detection | `--useragent \"Mozilla/5.0...\"` |\n\n### Social Media & Personal Intel\n\n| Module | Description | Usage Example |\n|--------|-------------|---------------|\n| \ud83d\udc65 **Social Checker** | Username availability across social platforms | `--social johndoe` |\n| \ud83d\udc19 **GitHub Intel** | GitHub user and repository intelligence | `--github octocat` |\n| \ud83d\udcf1 **Phone Intel** | Phone number intelligence and carrier info | `--phone +1234567890` |\n| \ud83d\udce7 **Email Validator** | Email address validation and domain analysis | `--email test@example.com` |\n| \ud83d\uddd1\ufe0f **Temp Email Checker** | Temporary/disposable email detection | `--temp-email test@tempmail.com` |\n\n### Document & Metadata Analysis\n\n| Module | Description | Usage Example |\n|--------|-------------|---------------|\n| \ud83d\udcf7 **EXIF Extractor** | Image metadata and EXIF data extraction | `--exif image.jpg` |\n| \ud83d\udcc4 **Doc Metadata** | Document metadata extraction (PDF, DOCX, etc.) | `--metadata document.pdf` |\n\n### Search & Discovery\n\n| Module | Description | Usage Example |\n|--------|-------------|---------------|\n| \ud83d\udd0d **Google Dorking** | Advanced Google search queries | `--dork \"site:example.com filetype:pdf\"` |\n| \ud83c\udf10 **Subdomain Finder** | Subdomain discovery and enumeration | `--subdomains example.com` |\n| \u23f0 **Wayback Machine** | Historical website data from Internet Archive | `--wayback example.com` |\n| \ud83d\udd77\ufe0f **Common Crawl** | Search Common Crawl web archive data | `--common-crawl example.com` |\n| \ud83d\udccb **Pastebin Search** | Search Pastebin for data dumps and leaks | `--pastebin searchterm` |\n| \ud83d\udcbe **Leak Search** | Data breach and leak detection | `--leak email@example.com` |\n| \ud83d\udcc2 **Google Drive Leaks** | Search for leaked Google Drive files | `--gdrive folderID` |\n| \ud83d\uddfa\ufe0f **Maps Parser** | Parse and analyze Google Maps links | `--maps \"https://maps.google.com/...\"` |\n\n### Threat Intelligence\n\n| Module | Description | Usage Example |\n|--------|-------------|---------------|\n| \ud83d\udee1\ufe0f **Shodan Lookup** | Shodan API integration for host intelligence | `--shodan 8.8.8.8` |\n\n---\n\n## \ud83d\udd11 API Key Configuration\n\nSome modules require API keys for enhanced functionality. BloodRecon now offers multiple convenient ways to configure your API keys:\n\n### Shodan API Key\n\n#### \ud83d\ude80 **Recommended Method: Command Line Setup (v1.2.0+)**\n\n1. **Get your free API key** at [Shodan.io](https://account.shodan.io/register)\n2. **Set it instantly with one command**:\n\n```bash\n# Set your Shodan API key (replaces any existing key)\npython3 bloodrecon.py --shodan-api \"your_shodan_api_key_here\"\n```\n\n3. **Start using Shodan immediately**:\n\n```bash\n# Your API key is now saved and ready to use!\npython3 bloodrecon.py --shodan 8.8.8.8\npython3 bloodrecon.py --shodan google.com\n```\n\n#### \ud83d\udcc1 **Configuration Details**\n- **Storage Location**: `~/.config-vritrasecz/bloodrecon-shodan.json`\n- **Auto Directory Creation**: Config directories are created automatically\n- **Key Replacement**: New keys seamlessly replace existing ones\n- **Persistent Storage**: API key is saved for all future sessions\n\n#### \ud83d\udd04 **Alternative Methods**\n\n**Environment Variable:**\n```bash\nexport SHODAN_API_KEY=\"your_api_key_here\"\npython3 bloodrecon.py --shodan 8.8.8.8\n```\n\n**Legacy config.py (still supported):**\n```python\n# modules/config.py\nSHODAN_API_KEY = 'your_shodan_api_key_here'\n```\n\n**Interactive Mode:**\n- The tool will prompt for the key if not configured\n- Entered keys are automatically saved for future use\n\n### API Key Security\n\n\ud83d\udd12 **Security Best Practices**:\n- \u2705 Use the `--shodan-api` command for secure local storage\n- \u2705 Use environment variables for server deployments\n- \u274c Never commit API keys to version control\n- \u274c Avoid hardcoding keys in scripts\n\n\ud83d\udca1 **Pro Tip**: The new JSON config system in v1.2.0 provides the most reliable and user-friendly API key management!\n\n---\n\n## \ud83d\udcf8 Screenshots\n\n### Interactive Menu\n![Interactive Menu](https://i.ibb.co/bjQZ3xfc/Screenshot-From-2025-07-28-01-46-15.png)\n\n---\n\n## \ud83d\udcc1 Folder Structure\n\n```plaintext\nBloodRecon/\n\u2502\n\u251c\u2500\u2500 \ud83d\udcc4 bloodrecon.py             # Main application file\n\u251c\u2500\u2500 \ud83d\udcc4 requirements.txt          # Python dependencies\n\u251c\u2500\u2500 \ud83d\udcc4 LICENSE                   # License File\n\u251c\u2500\u2500 \ud83d\udcc4 README.md                 # This file\n\u251c\u2500\u2500 \ud83d\udcc4 CHANGELOG.md              # Version history and changes\n\u2502\n\u2514\u2500\u2500 \ud83d\udcc1 modules/                  # OSINT modules directory\n    \u251c\u2500\u2500 \ud83d\udcc1 list-imp/             # Important list\n    \u2502   \u251c\u2500\u2500 \ud83d\udcc4 common.txt        # Password list for Dir Bruteforce\n    \u2502   \u2514\u2500\u2500 \ud83d\udcc4 temp-domains.txt  # Temp mail domain list\n    \u2502\n    \u251c\u2500\u2500 \ud83d\udcc4 __init__.py           # Module initialization\n    \u251c\u2500\u2500 \ud83d\udcc4 colors.py             # Color management and styling\n    \u251c\u2500\u2500 \ud83d\udcc4 config.py             # Configuration file (API keys)\n    \u2502\n    \u251c\u2500\u2500 \ud83c\udf10 Network & Infrastructure\n    \u251c\u2500\u2500 \ud83d\udcc4 ip_lookup.py          # IP address intelligence\n    \u251c\u2500\u2500 \ud83d\udcc4 whois_lookup.py       # WHOIS domain lookup\n    \u251c\u2500\u2500 \ud83d\udcc4 dns_lookup.py         # DNS records analysis\n    \u251c\u2500\u2500 \ud83d\udcc4 reverse_dns.py        # Reverse DNS lookup\n    \u251c\u2500\u2500 \ud83d\udcc4 port_scanner.py       # Port scanning functionality\n    \u251c\u2500\u2500 \ud83d\udcc4 ssl_scanner.py        # SSL certificate analysis\n    \u251c\u2500\u2500 \ud83d\udcc4 ip_range_scanner.py   # IP range scanning\n    \u251c\u2500\u2500 \ud83d\udcc4 asn_resolver.py       # ASN to IP range resolution\n    \u251c\u2500\u2500 \ud83d\udcc4 isp_tracker.py        # ISP tracking\n    \u2502\n    \u251c\u2500\u2500 \ud83d\udd12 Web Application Security\n    \u251c\u2500\u2500 \ud83d\udcc4 http_headers.py       # HTTP headers analysis\n    \u251c\u2500\u2500 \ud83d\udcc4 robots_scanner.py     # Robots.txt scanner\n    \u251c\u2500\u2500 \ud83d\udcc4 directory_bruteforce.py # Directory bruteforcing\n    \u251c\u2500\u2500 \ud83d\udcc4 sitemap_parser.py     # Sitemap analysis\n    \u251c\u2500\u2500 \ud83d\udcc4 js_endpoint_scanner.py # JavaScript endpoint discovery\n    \u251c\u2500\u2500 \ud83d\udcc4 favicon_hash.py       # Favicon hash generation\n    \u251c\u2500\u2500 \ud83d\udcc4 tech_fingerprint.py   # Technology fingerprinting\n    \u251c\u2500\u2500 \ud83d\udcc4 url_analyzer.py       # URL threat analysis\n    \u251c\u2500\u2500 \ud83d\udcc4 useragent_detector.py # User-Agent analysis\n    \u2502\n    \u251c\u2500\u2500 \ud83d\udc65 Social & Personal Intel\n    \u251c\u2500\u2500 \ud83d\udcc4 social_checker.py     # Social media username check\n    \u251c\u2500\u2500 \ud83d\udcc4 github_intel.py       # GitHub intelligence\n    \u251c\u2500\u2500 \ud83d\udcc4 phone_intel.py        # Phone number analysis\n    \u251c\u2500\u2500 \ud83d\udcc4 email_validator.py    # Email validation\n    \u251c\u2500\u2500 \ud83d\udcc4 temp_email_checker.py # Temporary email detection\n    \u2502\n    \u251c\u2500\u2500 \ud83d\udcc4 Document & Metadata Analysis\n    \u251c\u2500\u2500 \ud83d\udcc4 exif_extractor.py     # EXIF metadata extraction\n    \u251c\u2500\u2500 \ud83d\udcc4 doc_metadata.py       # Document metadata analysis\n    \u2502\n    \u251c\u2500\u2500 \ud83d\udd0d Search & Discovery\n    \u251c\u2500\u2500 \ud83d\udcc4 google_dorking.py     # Google dorking\n    \u251c\u2500\u2500 \ud83d\udcc4 subdomain_finder.py   # Subdomain discovery\n    \u251c\u2500\u2500 \ud83d\udcc4 wayback_machine.py    # Wayback Machine search\n    \u251c\u2500\u2500 \ud83d\udcc4 common_crawl.py       # Common Crawl search\n    \u251c\u2500\u2500 \ud83d\udcc4 pastebin_search.py    # Pastebin searching\n    \u251c\u2500\u2500 \ud83d\udcc4 leak_search.py        # Data breach search\n    \u251c\u2500\u2500 \ud83d\udcc4 google_drive_leaks.py # Google Drive leak search\n    \u251c\u2500\u2500 \ud83d\udcc4 maps_parser.py        # Google Maps link parser\n    \u2514\u2500\u2500 \ud83d\udcc4 shodan_lookup.py   # Shodan API integration\n\n```\n\n---\n\n## \u2696\ufe0f Legal Disclaimer\n\n**\u26a0\ufe0f IMPORTANT**: This tool is designed exclusively for **educational purposes** and **authorized security testing**.\n\n### \u2705 Authorized Uses\n- Educational purposes and learning OSINT techniques\n- Authorized penetration testing and security assessments\n- Bug bounty programs with proper scope authorization\n- Digital forensics investigations by authorized personnel\n- Security research within legal boundaries\n\n### \u274c Prohibited Uses\n- Unauthorized surveillance or stalking\n- Illegal data collection or privacy violations\n- Malicious reconnaissance or attack preparation\n- Any activity violating local, state, or federal laws\n\n**Users are solely responsible for ensuring compliance with applicable laws and regulations in their jurisdiction.**\n\n---\n\n## \ud83d\udc68\u200d\ud83d\udcbb Author\n\n<div align=\"center\">\n  <img src=\"https://github.com/VritraSecz.png\" width=\"100\" height=\"100\" style=\"border-radius: 50%;\">\n  <h3>Alex Butler</h3>\n  <p><strong>Vritra Security Organization</strong></p>\n</div>\n\n### \ud83c\udf10 Connect With Us\n\n+ [![Creator](https://img.shields.io/badge/Creator-Alex%20%7C%20VritraSec-%23f97316?style=for-the-badge&logo=github)](https://vritrasec.com)\n+ [![Website](https://img.shields.io/badge/Website-vritrasec.com-%233b82f6?style=for-the-badge&logo=googlechrome&logoColor=white)](https://vritrasec.com)\n+ [![GitHub](https://img.shields.io/badge/GitHub-VritraSecz-%231f2937?style=for-the-badge&logo=github&logoColor=white)](https://github.com/VritraSecz)\n+ [![Instagram](https://img.shields.io/badge/Instagram-%40haxorlex-%23E1306C?style=for-the-badge&logo=instagram&logoColor=white)](https://instagram.com/haxorlex)\n+ [![YouTube](https://img.shields.io/badge/YouTube-%40Technolex-%23FF0000?style=for-the-badge&logo=youtube&logoColor=white)](https://youtube.com/@Technolex)\n+ [![Telegram Channel](https://img.shields.io/badge/Channel-%40LinkCentralX-%2326A5E4?style=for-the-badge&logo=telegram&logoColor=white)](https://t.me/LinkCentralX)\n+ [![Main Channel](https://img.shields.io/badge/Main%20Updates-%40VritraSec-%23096AEB?style=for-the-badge&logo=telegram&logoColor=white)](https://t.me/VritraSec)\n+ [![Community](https://img.shields.io/badge/Community-%40VritraSecz-%230168C4?style=for-the-badge&logo=telegram&logoColor=white)](https://t.me/VritraSecz)\n+ [![Support Bot](https://img.shields.io/badge/Support%20Bot-@ethicxbot-%2363ccff?style=for-the-badge&logo=bot&logoColor=white)](https://t.me/ethicxbot)\n\n\n---\n\n## \ud83e\udd1d Contributing\n\nContributions are welcome! Here's how you can help:\n\n1. \ud83c\udf74 **Fork the repository**\n2. \ud83c\udf3f **Create a feature branch** (`git checkout -b feature/AmazingFeature`)\n3. \ud83d\udcbe **Commit your changes** (`git commit -m 'Add some AmazingFeature'`)\n4. \ud83d\udce4 **Push to the branch** (`git push origin feature/AmazingFeature`)\n5. \ud83d\udd04 **Open a Pull Request**\n\n### \ud83d\udca1 Ways to Contribute\n- \ud83d\udc1b Report bugs and issues\n- \ud83d\udca1 Suggest new features or modules\n- \ud83d\udcd6 Improve documentation\n- \ud83d\udd27 Add new OSINT modules\n- \ud83e\uddea Write tests\n- \ud83c\udf0d Translate to other languages\n\n\n\n---\n\n## \ud83d\udcc4 License\n\n\n### \ud83c\udff7\ufe0f MIT License \u2014 Permissions, Limitations & Requirements\n\n#### \u2705 Permissions\n\n+ ![Commercial Use](https://img.shields.io/badge/\u2705%20Commercial%20Use-Allowed-brightgreen?style=flat-square&logo=dollar-sign&logoColor=white)\n+ ![Modification](https://img.shields.io/badge/\u2705%20Modification-Allowed-brightgreen?style=flat-square&logo=edit&logoColor=white)\n+ ![Distribution](https://img.shields.io/badge/\u2705%20Distribution-Allowed-brightgreen?style=flat-square&logo=share&logoColor=white)\n+ ![Private Use](https://img.shields.io/badge/\u2705%20Private%20Use-Allowed-brightgreen?style=flat-square&logo=lock&logoColor=white)\n\n#### \u274c Limitations\n\n+ ![No Warranty](https://img.shields.io/badge/\u274c%20No%20Warranty-Provided-red?style=flat-square&logo=shield-x&logoColor=white)\n+ ![No Liability](https://img.shields.io/badge/\u274c%20No%20Liability-Accepted-red?style=flat-square&logo=alert-triangle&logoColor=white)\n\n#### \u26a0\ufe0f Requirements\n\n+ ![License Notice](https://img.shields.io/badge/\u26a0\ufe0f%20License%20Notice-Required-orange?style=flat-square&logo=document-text&logoColor=white)\n\n\n---\n\n<div align=\"center\">\n  <p>\u2b50 If you found BloodRecon useful, please consider giving it a star!</p>\n  <b>Made with \u2764\ufe0f by <a href=\"https://github.com/VritraSecz\">Alex Butler</a></b>\n</div>\n\n\n\n\n\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Advanced OSINT Intelligence Framework for cybersecurity professionals",
    "version": "1.2.1",
    "project_urls": {
        "Bug Reports": "https://github.com/VritraSecz/BloodRecon/issues",
        "Developer Website": "https://vritrasec.com",
        "Documentation": "https://github.com/VritraSecz/BloodRecon/blob/main/README.md",
        "Homepage": "https://github.com/VritraSecz/BloodRecon",
        "Repository": "https://github.com/VritraSecz/BloodRecon"
    },
    "split_keywords": [
        "osint",
        " reconnaissance",
        " cybersecurity",
        " intelligence",
        " framework",
        " penetration-testing"
    ],
    "urls": [
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "b930cc73c07e6473f878cd8ce26bd85cbff464a3e9da561ab65d18c2264c48ab",
                "md5": "947fdb68277a3e6587c980aa27220c41",
                "sha256": "0ab6aa8ca0b60fa6e55c3f767c91581405720c85156abe5e4d43c2f928db5eb2"
            },
            "downloads": -1,
            "filename": "bloodrecon-1.2.1-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "947fdb68277a3e6587c980aa27220c41",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.7",
            "size": 145254,
            "upload_time": "2025-07-31T21:50:51",
            "upload_time_iso_8601": "2025-07-31T21:50:51.919372Z",
            "url": "https://files.pythonhosted.org/packages/b9/30/cc73c07e6473f878cd8ce26bd85cbff464a3e9da561ab65d18c2264c48ab/bloodrecon-1.2.1-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": null,
            "digests": {
                "blake2b_256": "22c18c70fa5beb8559db5bf035e1070be60d307fafd4d423520a6a8ba7ba1ec2",
                "md5": "b01fc5d0dd19a463e8169c0e26508898",
                "sha256": "15e99c0dbe73b725d82ee765bb6a27b6f79ed2956eb5d86c744dd867a897b9e6"
            },
            "downloads": -1,
            "filename": "bloodrecon-1.2.1.tar.gz",
            "has_sig": false,
            "md5_digest": "b01fc5d0dd19a463e8169c0e26508898",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.7",
            "size": 132091,
            "upload_time": "2025-07-31T21:50:53",
            "upload_time_iso_8601": "2025-07-31T21:50:53.965351Z",
            "url": "https://files.pythonhosted.org/packages/22/c1/8c70fa5beb8559db5bf035e1070be60d307fafd4d423520a6a8ba7ba1ec2/bloodrecon-1.2.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-07-31 21:50:53",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "VritraSecz",
    "github_project": "BloodRecon",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "requirements": [
        {
            "name": "colorama",
            "specs": [
                [
                    "==",
                    "0.4.6"
                ]
            ]
        },
        {
            "name": "dnspython",
            "specs": [
                [
                    "==",
                    "2.7.0"
                ]
            ]
        },
        {
            "name": "mmh3",
            "specs": [
                [
                    "==",
                    "5.1.0"
                ]
            ]
        },
        {
            "name": "phonenumbers",
            "specs": [
                [
                    "==",
                    "9.0.10"
                ]
            ]
        },
        {
            "name": "Pillow",
            "specs": [
                [
                    "==",
                    "11.3.0"
                ]
            ]
        },
        {
            "name": "requests",
            "specs": [
                [
                    "==",
                    "2.32.4"
                ]
            ]
        },
        {
            "name": "shodan",
            "specs": [
                [
                    "==",
                    "1.31.0"
                ]
            ]
        },
        {
            "name": "urllib3",
            "specs": [
                [
                    "==",
                    "2.5.0"
                ]
            ]
        },
        {
            "name": "whois",
            "specs": [
                [
                    "==",
                    "1.20240129.2"
                ]
            ]
        }
    ],
    "lcname": "bloodrecon"
}
        
Elapsed time: 0.63536s