<div align="center">
# π©Έ BloodRecon π©Έ
[](https://www.python.org/downloads/)
[](LICENSE)
[](#compatibility)
[](#overview)
[](#overview)
[](#contributing)
[](https://github.com/VritraSecz/BloodRecon)
[](https://github.com/VritraSecz/BloodRecon)
[](https://github.com/VritraSecz/BloodRecon/issues)
[](https://github.com/VritraSecz/BloodRecon/graphs/contributors)
[](https://github.com/VritraSecz/BloodRecon)
[](https://github.com/VritraSecz/BloodRecon)
</div>
<div align="center">
<h3>β‘ OSINT Intelligence Framework β‘</h3>
<h4>π©Έ Blood is the Key π©Έ</h4>
<p>A comprehensive OSINT toolkit for cybersecurity professionals, penetration testers, bug bounty hunters, and digital forensics investigators.</p>
</div>
---
## π What's New in v1.2.0
### π Enhanced Shodan Integration
We've completely revamped the Shodan integration with powerful new features that make API key management effortless!
#### β¨ Key Improvements:
**π§ Command Line API Management**
```bash
# Set your Shodan API key instantly - no more interactive prompts!
python3 bloodrecon.py --shodan-api "your_api_key_here"
```
**π Streamlined Configuration**
- **New Location**: `~/.config-vritrasecz/bloodrecon-shodan.json`
- **Auto Directory Creation**: Tool creates config directories automatically
- **JSON-Only Storage**: Simplified, reliable configuration management
**π Smart API Key Handling**
- **Automatic Replacement**: New API keys seamlessly replace existing ones
- **Input Validation**: Enhanced validation prevents empty or invalid keys
- **Better Error Messages**: Clear, actionable feedback for users
**β‘ Improved User Experience**
- **One-Command Setup**: Get Shodan running with a single command
- **Non-Interactive Mode**: Perfect for automation and scripting
- **Cleaner Output**: More intuitive and professional interface
#### π οΈ Quick Setup Example:
```bash
# 1. Set your API key (one time setup)
python3 bloodrecon.py --shodan-api "your_shodan_api_key"
# 2. Start using Shodan immediately
python3 bloodrecon.py --shodan 8.8.8.8
python3 bloodrecon.py --shodan google.com
```
> π‘ **Pro Tip**: Your API key is saved securely and will be used automatically for all future Shodan queries!
**π What Changed:**
- Moved from `~/.osint_shodan_config` to organized `~/.config-vritrasecz/` directory
- Removed dual config.py file management for simplified workflow
- Enhanced error handling and user feedback
- Added `--shodan-api` command line argument
**π Get Started**: [View complete changelog](CHANGELOG.md) β’ [API Configuration Guide](#-api-key-configuration)
---
## π Table of Contents
- [π― Overview](#-overview)
- [β¨ Key Features](#-key-features)
- [π οΈ Installation](#οΈ-installation)
- [Linux Installation](#linux-installation)
- [Termux Installation](#termux-installation)
- [Dependencies](#dependencies)
- [π Usage](#-usage)
- [Interactive Mode](#interactive-mode)
- [Command Line Usage](#command-line-usage)
- [π§ Modules](#-modules)
- [Network & Infrastructure](#network--infrastructure)
- [Web Application Security](#web-application-security)
- [Social Media & Personal Intel](#social-media--personal-intel)
- [Document & Metadata Analysis](#document--metadata-analysis)
- [Search & Discovery](#search--discovery)
- [Communication Intelligence](#communication-intelligence)
- [Threat Intelligence](#threat-intelligence)
- [π API Key Configuration](#-api-key-configuration)
- [πΈ Screenshots](#-screenshots)
- [π Folder Structure](#-folder-structure)
- [βοΈ Legal Disclaimer](#οΈ-legal-disclaimer)
- [π¨βπ» Author](#-author)
- [π€ Contributing](#-contributing)
- [π License](#-license)
---
## π― Overview
BloodRecon is a state-of-the-art OSINT (Open Source Intelligence) framework that provides cybersecurity professionals with 34+ specialized modules for comprehensive reconnaissance and intelligence gathering. Built with Python 3.x, it offers both interactive menu-driven and command-line interfaces for maximum flexibility.
## β¨ Key Features
π **34 Specialized OSINT Modules**
π **Network & Infrastructure Analysis** (IP, DNS, WHOIS, SSL, Ports)
π **Web Application Security Testing** (Headers, Robots, Directories)
π₯ **Social Media & Personal Intelligence** (GitHub, Social Platforms)
π **Document & Metadata Analysis** (EXIF, Document Properties)
π **Advanced Search Capabilities** (Google Dorking, Wayback Machine)
π **Communication Intelligence** (Email, Phone Number Analysis)
π‘οΈ **Threat Intelligence Integration** (Shodan)
πΎ **Data Breach & Leak Detection**
π¨ **Interactive CLI Interface** with Target Input Examples
π **Colored Terminal Output** for Enhanced Readability
---
## π οΈ Installation
### Linux Installation
```bash
# Clone the repository
git clone https://github.com/VritraSecz/BloodRecon.git
# Navigate to the project directory
cd BloodRecon
# Install Python dependencies
pip install -r requirements.txt
# Make the script executable
chmod +x bloodrecon.py
# Run the tool
python bloodrecon.py --interactive
```
### Termux Installation
```bash
# Update packages and install dependencies
pkg update && pkg upgrade
pkg install git python
# Clone the repository
git clone https://github.com/VritraSecz/BloodRecon.git
# Navigate to the project directory
cd BloodRecon
# Install Python dependencies
pip install -r requirements.txt
# Run the tool
python bloodrecon.py --interactive
```
### Dependencies
BloodRecon requires the following Python packages:
```text
colorama==0.4.6
dnspython==2.7.0
mmh3==5.1.0
phonenumbers==9.0.10
Pillow==11.3.0
requests==2.32.4
shodan==1.31.0
urllib3==2.5.0
whois==1.20240129.2
```
---
## π Usage
### Interactive Mode
Launch BloodRecon in interactive mode for a user-friendly menu experience:
```bash
python bloodrecon.py --interactive
```
### Command Line Usage
BloodRecon supports extensive command-line options for automation and scripting:
#### Basic Usage Examples
```bash
# IP Address Analysis
python bloodrecon.py --ip 8.8.8.8
# Domain WHOIS Lookup
python bloodrecon.py --whois example.com
# DNS Records Analysis
python bloodrecon.py --dns google.com
# HTTP Headers Analysis
python bloodrecon.py --headers https://example.com
# Social Media Username Check
python bloodrecon.py --social username123
# Email Validation
python bloodrecon.py --email test@example.com
# Phone Number Intelligence
python bloodrecon.py --phone +1234567890
# Shodan Intelligence Lookup
python bloodrecon.py --shodan 8.8.8.8
```
#### Advanced Usage Examples
```bash
# Google Dorking
python bloodrecon.py --dork "site:example.com filetype:pdf"
# Subdomain Discovery
python bloodrecon.py --subdomains example.com
# SSL Certificate Analysis
python bloodrecon.py --ssl example.com:443
# Directory Bruteforcing
python bloodrecon.py --dir-brute https://example.com
# JavaScript Endpoint Scanner
python bloodrecon.py --js-endpoints https://example.com
# IP Range Scanner
python bloodrecon.py --ip-scan 192.168.1.0/24
# Wayback Machine Search
python bloodrecon.py --wayback example.com
# GitHub Intelligence
python bloodrecon.py --github octocat
```
#### Tool Information
```bash
# Display detailed tool information
python bloodrecon.py --about
# Show developer contact information
python bloodrecon.py --connect
# Show version
python bloodrecon.py --version
# Display help
python bloodrecon.py --help
```
---
## π§ Modules
BloodRecon features 34+ specialized OSINT modules organized into categories:
### Network & Infrastructure
| Module | Description | Usage Example |
|--------|-------------|---------------|
| π **IP Lookup** | Comprehensive IP address intelligence including geolocation, ISP, ASN | `--ip 8.8.8.8` |
| π **WHOIS Lookup** | Domain registration information and ownership details | `--whois example.com` |
| π **DNS Lookup** | DNS records analysis (A, AAAA, MX, TXT, NS) | `--dns google.com` |
| π **Reverse DNS** | Reverse DNS lookup for IP addresses | `--reverse 8.8.8.8` |
| π **Port Scanner** | Network port scanning and service detection | `--ports 192.168.1.1` |
| π **SSL Scanner** | SSL/TLS certificate analysis and security assessment | `--ssl example.com:443` |
| π **IP Range Scanner** | Scan IP ranges for active hosts | `--ip-scan 192.168.1.0/24` |
| π’ **ASN Resolver** | Resolve ASN numbers to IP ranges | `--asn AS15169` |
| π **ISP Tracker** | Track IP addresses to ISP information | `--isp 8.8.8.8` |
### Web Application Security
| Module | Description | Usage Example |
|--------|-------------|---------------|
| π **HTTP Headers** | HTTP security headers analysis | `--headers https://example.com` |
| π€ **Robots Scanner** | Robots.txt file analysis and discovery | `--robots https://example.com` |
| π **Directory Bruteforce** | Web directory and file discovery | `--dir-brute https://example.com` |
| πΊοΈ **Sitemap Parser** | XML sitemap parsing and analysis | `--sitemap https://example.com` |
| β‘ **JS Endpoint Scanner** | JavaScript file analysis for API endpoints | `--js-endpoints https://example.com` |
| π¨ **Favicon Hash** | Generate favicon hashes for fingerprinting | `--favicon https://example.com` |
| π§ **Tech Fingerprint** | Web technology stack identification | `--tech https://example.com` |
| π **URL Analyzer** | URL threat analysis and reputation check | `--url https://suspicious-site.com` |
| π **User-Agent Detector** | User-Agent string analysis and detection | `--useragent "Mozilla/5.0..."` |
### Social Media & Personal Intel
| Module | Description | Usage Example |
|--------|-------------|---------------|
| π₯ **Social Checker** | Username availability across social platforms | `--social johndoe` |
| π **GitHub Intel** | GitHub user and repository intelligence | `--github octocat` |
| π± **Phone Intel** | Phone number intelligence and carrier info | `--phone +1234567890` |
| π§ **Email Validator** | Email address validation and domain analysis | `--email test@example.com` |
| ποΈ **Temp Email Checker** | Temporary/disposable email detection | `--temp-email test@tempmail.com` |
### Document & Metadata Analysis
| Module | Description | Usage Example |
|--------|-------------|---------------|
| π· **EXIF Extractor** | Image metadata and EXIF data extraction | `--exif image.jpg` |
| π **Doc Metadata** | Document metadata extraction (PDF, DOCX, etc.) | `--metadata document.pdf` |
### Search & Discovery
| Module | Description | Usage Example |
|--------|-------------|---------------|
| π **Google Dorking** | Advanced Google search queries | `--dork "site:example.com filetype:pdf"` |
| π **Subdomain Finder** | Subdomain discovery and enumeration | `--subdomains example.com` |
| β° **Wayback Machine** | Historical website data from Internet Archive | `--wayback example.com` |
| π·οΈ **Common Crawl** | Search Common Crawl web archive data | `--common-crawl example.com` |
| π **Pastebin Search** | Search Pastebin for data dumps and leaks | `--pastebin searchterm` |
| πΎ **Leak Search** | Data breach and leak detection | `--leak email@example.com` |
| π **Google Drive Leaks** | Search for leaked Google Drive files | `--gdrive folderID` |
| πΊοΈ **Maps Parser** | Parse and analyze Google Maps links | `--maps "https://maps.google.com/..."` |
### Threat Intelligence
| Module | Description | Usage Example |
|--------|-------------|---------------|
| π‘οΈ **Shodan Lookup** | Shodan API integration for host intelligence | `--shodan 8.8.8.8` |
---
## π API Key Configuration
Some modules require API keys for enhanced functionality. BloodRecon now offers multiple convenient ways to configure your API keys:
### Shodan API Key
#### π **Recommended Method: Command Line Setup (v1.2.0+)**
1. **Get your free API key** at [Shodan.io](https://account.shodan.io/register)
2. **Set it instantly with one command**:
```bash
# Set your Shodan API key (replaces any existing key)
python3 bloodrecon.py --shodan-api "your_shodan_api_key_here"
```
3. **Start using Shodan immediately**:
```bash
# Your API key is now saved and ready to use!
python3 bloodrecon.py --shodan 8.8.8.8
python3 bloodrecon.py --shodan google.com
```
#### π **Configuration Details**
- **Storage Location**: `~/.config-vritrasecz/bloodrecon-shodan.json`
- **Auto Directory Creation**: Config directories are created automatically
- **Key Replacement**: New keys seamlessly replace existing ones
- **Persistent Storage**: API key is saved for all future sessions
#### π **Alternative Methods**
**Environment Variable:**
```bash
export SHODAN_API_KEY="your_api_key_here"
python3 bloodrecon.py --shodan 8.8.8.8
```
**Legacy config.py (still supported):**
```python
# modules/config.py
SHODAN_API_KEY = 'your_shodan_api_key_here'
```
**Interactive Mode:**
- The tool will prompt for the key if not configured
- Entered keys are automatically saved for future use
### API Key Security
π **Security Best Practices**:
- β
Use the `--shodan-api` command for secure local storage
- β
Use environment variables for server deployments
- β Never commit API keys to version control
- β Avoid hardcoding keys in scripts
π‘ **Pro Tip**: The new JSON config system in v1.2.0 provides the most reliable and user-friendly API key management!
---
## πΈ Screenshots
### Interactive Menu

---
## π Folder Structure
```plaintext
BloodRecon/
β
βββ π bloodrecon.py # Main application file
βββ π requirements.txt # Python dependencies
βββ π LICENSE # License File
βββ π README.md # This file
βββ π CHANGELOG.md # Version history and changes
β
βββ π modules/ # OSINT modules directory
βββ π list-imp/ # Important list
β βββ π common.txt # Password list for Dir Bruteforce
β βββ π temp-domains.txt # Temp mail domain list
β
βββ π __init__.py # Module initialization
βββ π colors.py # Color management and styling
βββ π config.py # Configuration file (API keys)
β
βββ π Network & Infrastructure
βββ π ip_lookup.py # IP address intelligence
βββ π whois_lookup.py # WHOIS domain lookup
βββ π dns_lookup.py # DNS records analysis
βββ π reverse_dns.py # Reverse DNS lookup
βββ π port_scanner.py # Port scanning functionality
βββ π ssl_scanner.py # SSL certificate analysis
βββ π ip_range_scanner.py # IP range scanning
βββ π asn_resolver.py # ASN to IP range resolution
βββ π isp_tracker.py # ISP tracking
β
βββ π Web Application Security
βββ π http_headers.py # HTTP headers analysis
βββ π robots_scanner.py # Robots.txt scanner
βββ π directory_bruteforce.py # Directory bruteforcing
βββ π sitemap_parser.py # Sitemap analysis
βββ π js_endpoint_scanner.py # JavaScript endpoint discovery
βββ π favicon_hash.py # Favicon hash generation
βββ π tech_fingerprint.py # Technology fingerprinting
βββ π url_analyzer.py # URL threat analysis
βββ π useragent_detector.py # User-Agent analysis
β
βββ π₯ Social & Personal Intel
βββ π social_checker.py # Social media username check
βββ π github_intel.py # GitHub intelligence
βββ π phone_intel.py # Phone number analysis
βββ π email_validator.py # Email validation
βββ π temp_email_checker.py # Temporary email detection
β
βββ π Document & Metadata Analysis
βββ π exif_extractor.py # EXIF metadata extraction
βββ π doc_metadata.py # Document metadata analysis
β
βββ π Search & Discovery
βββ π google_dorking.py # Google dorking
βββ π subdomain_finder.py # Subdomain discovery
βββ π wayback_machine.py # Wayback Machine search
βββ π common_crawl.py # Common Crawl search
βββ π pastebin_search.py # Pastebin searching
βββ π leak_search.py # Data breach search
βββ π google_drive_leaks.py # Google Drive leak search
βββ π maps_parser.py # Google Maps link parser
βββ π shodan_lookup.py # Shodan API integration
```
---
## βοΈ Legal Disclaimer
**β οΈ IMPORTANT**: This tool is designed exclusively for **educational purposes** and **authorized security testing**.
### β
Authorized Uses
- Educational purposes and learning OSINT techniques
- Authorized penetration testing and security assessments
- Bug bounty programs with proper scope authorization
- Digital forensics investigations by authorized personnel
- Security research within legal boundaries
### β Prohibited Uses
- Unauthorized surveillance or stalking
- Illegal data collection or privacy violations
- Malicious reconnaissance or attack preparation
- Any activity violating local, state, or federal laws
**Users are solely responsible for ensuring compliance with applicable laws and regulations in their jurisdiction.**
---
## π¨βπ» Author
<div align="center">
<img src="https://github.com/VritraSecz.png" width="100" height="100" style="border-radius: 50%;">
<h3>Alex Butler</h3>
<p><strong>Vritra Security Organization</strong></p>
</div>
### π Connect With Us
+ [](https://vritrasec.com)
+ [](https://vritrasec.com)
+ [](https://github.com/VritraSecz)
+ [](https://instagram.com/haxorlex)
+ [](https://youtube.com/@Technolex)
+ [](https://t.me/LinkCentralX)
+ [](https://t.me/VritraSec)
+ [](https://t.me/VritraSecz)
+ [](https://t.me/ethicxbot)
---
## π€ Contributing
Contributions are welcome! Here's how you can help:
1. π΄ **Fork the repository**
2. πΏ **Create a feature branch** (`git checkout -b feature/AmazingFeature`)
3. πΎ **Commit your changes** (`git commit -m 'Add some AmazingFeature'`)
4. π€ **Push to the branch** (`git push origin feature/AmazingFeature`)
5. π **Open a Pull Request**
### π‘ Ways to Contribute
- π Report bugs and issues
- π‘ Suggest new features or modules
- π Improve documentation
- π§ Add new OSINT modules
- π§ͺ Write tests
- π Translate to other languages
---
## π License
### π·οΈ MIT License β Permissions, Limitations & Requirements
#### β
Permissions
+ 
+ 
+ 
+ 
#### β Limitations
+ 
+ 
#### β οΈ Requirements
+ 
---
<div align="center">
<p>β If you found BloodRecon useful, please consider giving it a star!</p>
<b>Made with β€οΈ by <a href="https://github.com/VritraSecz">Alex Butler</a></b>
</div>
Raw data
{
"_id": null,
"home_page": null,
"name": "bloodrecon",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.7",
"maintainer_email": null,
"keywords": "osint, reconnaissance, cybersecurity, intelligence, framework, penetration-testing",
"author": "Alex Butler - Vritra Security Organization",
"author_email": null,
"download_url": "https://files.pythonhosted.org/packages/22/c1/8c70fa5beb8559db5bf035e1070be60d307fafd4d423520a6a8ba7ba1ec2/bloodrecon-1.2.1.tar.gz",
"platform": null,
"description": "<div align=\"center\">\n\n# \ud83e\ude78 BloodRecon \ud83e\ude78\n\n[](https://www.python.org/downloads/)\n[](LICENSE)\n[](#compatibility)\n[](#overview)\n[](#overview)\n[](#contributing)\n[](https://github.com/VritraSecz/BloodRecon)\n[](https://github.com/VritraSecz/BloodRecon)\n[](https://github.com/VritraSecz/BloodRecon/issues)\n[](https://github.com/VritraSecz/BloodRecon/graphs/contributors)\n[](https://github.com/VritraSecz/BloodRecon)\n[](https://github.com/VritraSecz/BloodRecon)\n\n</div>\n\n<div align=\"center\">\n <h3>\u26a1 OSINT Intelligence Framework \u26a1</h3>\n <h4>\ud83e\ude78 Blood is the Key \ud83e\ude78</h4>\n <p>A comprehensive OSINT toolkit for cybersecurity professionals, penetration testers, bug bounty hunters, and digital forensics investigators.</p>\n</div>\n\n---\n\n## \ud83c\udf89 What's New in v1.2.0\n\n### \ud83d\ude80 Enhanced Shodan Integration\n\nWe've completely revamped the Shodan integration with powerful new features that make API key management effortless!\n\n#### \u2728 Key Improvements:\n\n**\ud83d\udd27 Command Line API Management**\n```bash\n# Set your Shodan API key instantly - no more interactive prompts!\npython3 bloodrecon.py --shodan-api \"your_api_key_here\"\n```\n\n**\ud83d\udcc1 Streamlined Configuration**\n- **New Location**: `~/.config-vritrasecz/bloodrecon-shodan.json`\n- **Auto Directory Creation**: Tool creates config directories automatically\n- **JSON-Only Storage**: Simplified, reliable configuration management\n\n**\ud83d\udd12 Smart API Key Handling**\n- **Automatic Replacement**: New API keys seamlessly replace existing ones\n- **Input Validation**: Enhanced validation prevents empty or invalid keys\n- **Better Error Messages**: Clear, actionable feedback for users\n\n**\u26a1 Improved User Experience**\n- **One-Command Setup**: Get Shodan running with a single command\n- **Non-Interactive Mode**: Perfect for automation and scripting\n- **Cleaner Output**: More intuitive and professional interface\n\n#### \ud83d\udee0\ufe0f Quick Setup Example:\n```bash\n# 1. Set your API key (one time setup)\npython3 bloodrecon.py --shodan-api \"your_shodan_api_key\"\n\n# 2. Start using Shodan immediately\npython3 bloodrecon.py --shodan 8.8.8.8\npython3 bloodrecon.py --shodan google.com\n```\n\n> \ud83d\udca1 **Pro Tip**: Your API key is saved securely and will be used automatically for all future Shodan queries!\n\n**\ud83d\udccb What Changed:**\n- Moved from `~/.osint_shodan_config` to organized `~/.config-vritrasecz/` directory\n- Removed dual config.py file management for simplified workflow\n- Enhanced error handling and user feedback\n- Added `--shodan-api` command line argument\n\n**\ud83d\udd17 Get Started**: [View complete changelog](CHANGELOG.md) \u2022 [API Configuration Guide](#-api-key-configuration)\n\n---\n\n## \ud83d\udcd6 Table of Contents\n\n- [\ud83c\udfaf Overview](#-overview)\n- [\u2728 Key Features](#-key-features)\n- [\ud83d\udee0\ufe0f Installation](#\ufe0f-installation)\n - [Linux Installation](#linux-installation)\n - [Termux Installation](#termux-installation)\n - [Dependencies](#dependencies)\n- [\ud83d\ude80 Usage](#-usage)\n - [Interactive Mode](#interactive-mode)\n - [Command Line Usage](#command-line-usage)\n- [\ud83d\udd27 Modules](#-modules)\n - [Network & Infrastructure](#network--infrastructure)\n - [Web Application Security](#web-application-security)\n - [Social Media & Personal Intel](#social-media--personal-intel)\n - [Document & Metadata Analysis](#document--metadata-analysis)\n - [Search & Discovery](#search--discovery)\n - [Communication Intelligence](#communication-intelligence)\n - [Threat Intelligence](#threat-intelligence)\n- [\ud83d\udd11 API Key Configuration](#-api-key-configuration)\n- [\ud83d\udcf8 Screenshots](#-screenshots)\n- [\ud83d\udcc1 Folder Structure](#-folder-structure)\n- [\u2696\ufe0f Legal Disclaimer](#\ufe0f-legal-disclaimer)\n- [\ud83d\udc68\u200d\ud83d\udcbb Author](#-author)\n- [\ud83e\udd1d Contributing](#-contributing)\n- [\ud83d\udcc4 License](#-license)\n\n---\n\n## \ud83c\udfaf Overview\n\nBloodRecon is a state-of-the-art OSINT (Open Source Intelligence) framework that provides cybersecurity professionals with 34+ specialized modules for comprehensive reconnaissance and intelligence gathering. Built with Python 3.x, it offers both interactive menu-driven and command-line interfaces for maximum flexibility.\n\n## \u2728 Key Features\n\n\ud83d\udd0d **34 Specialized OSINT Modules** \n\ud83c\udf10 **Network & Infrastructure Analysis** (IP, DNS, WHOIS, SSL, Ports) \n\ud83d\udd12 **Web Application Security Testing** (Headers, Robots, Directories) \n\ud83d\udc65 **Social Media & Personal Intelligence** (GitHub, Social Platforms) \n\ud83d\udcc4 **Document & Metadata Analysis** (EXIF, Document Properties) \n\ud83d\udd0e **Advanced Search Capabilities** (Google Dorking, Wayback Machine) \n\ud83d\udcde **Communication Intelligence** (Email, Phone Number Analysis) \n\ud83d\udee1\ufe0f **Threat Intelligence Integration** (Shodan) \n\ud83d\udcbe **Data Breach & Leak Detection** \n\ud83c\udfa8 **Interactive CLI Interface** with Target Input Examples \n\ud83c\udf08 **Colored Terminal Output** for Enhanced Readability \n\n---\n\n## \ud83d\udee0\ufe0f Installation\n\n### Linux Installation\n\n```bash\n# Clone the repository\ngit clone https://github.com/VritraSecz/BloodRecon.git\n\n# Navigate to the project directory\ncd BloodRecon\n\n# Install Python dependencies\npip install -r requirements.txt\n\n# Make the script executable\nchmod +x bloodrecon.py\n\n# Run the tool\npython bloodrecon.py --interactive\n```\n\n### Termux Installation\n\n```bash\n# Update packages and install dependencies\npkg update && pkg upgrade\npkg install git python\n\n# Clone the repository\ngit clone https://github.com/VritraSecz/BloodRecon.git\n\n# Navigate to the project directory\ncd BloodRecon\n\n# Install Python dependencies\npip install -r requirements.txt\n\n# Run the tool\npython bloodrecon.py --interactive\n```\n\n### Dependencies\n\nBloodRecon requires the following Python packages:\n\n```text\ncolorama==0.4.6\ndnspython==2.7.0\nmmh3==5.1.0\nphonenumbers==9.0.10\nPillow==11.3.0\nrequests==2.32.4\nshodan==1.31.0\nurllib3==2.5.0\nwhois==1.20240129.2\n```\n\n---\n\n## \ud83d\ude80 Usage\n\n### Interactive Mode\n\nLaunch BloodRecon in interactive mode for a user-friendly menu experience:\n\n```bash\npython bloodrecon.py --interactive\n```\n\n### Command Line Usage\n\nBloodRecon supports extensive command-line options for automation and scripting:\n\n#### Basic Usage Examples\n\n```bash\n# IP Address Analysis\npython bloodrecon.py --ip 8.8.8.8\n\n# Domain WHOIS Lookup\npython bloodrecon.py --whois example.com\n\n# DNS Records Analysis\npython bloodrecon.py --dns google.com\n\n# HTTP Headers Analysis\npython bloodrecon.py --headers https://example.com\n\n# Social Media Username Check\npython bloodrecon.py --social username123\n\n# Email Validation\npython bloodrecon.py --email test@example.com\n\n# Phone Number Intelligence\npython bloodrecon.py --phone +1234567890\n\n# Shodan Intelligence Lookup\npython bloodrecon.py --shodan 8.8.8.8\n```\n\n#### Advanced Usage Examples\n\n```bash\n# Google Dorking\npython bloodrecon.py --dork \"site:example.com filetype:pdf\"\n\n# Subdomain Discovery\npython bloodrecon.py --subdomains example.com\n\n# SSL Certificate Analysis\npython bloodrecon.py --ssl example.com:443\n\n# Directory Bruteforcing\npython bloodrecon.py --dir-brute https://example.com\n\n# JavaScript Endpoint Scanner\npython bloodrecon.py --js-endpoints https://example.com\n\n# IP Range Scanner\npython bloodrecon.py --ip-scan 192.168.1.0/24\n\n# Wayback Machine Search\npython bloodrecon.py --wayback example.com\n\n# GitHub Intelligence\npython bloodrecon.py --github octocat\n```\n\n#### Tool Information\n\n```bash\n# Display detailed tool information\npython bloodrecon.py --about\n\n# Show developer contact information\npython bloodrecon.py --connect\n\n# Show version\npython bloodrecon.py --version\n\n# Display help\npython bloodrecon.py --help\n```\n\n---\n\n## \ud83d\udd27 Modules\n\nBloodRecon features 34+ specialized OSINT modules organized into categories:\n\n### Network & Infrastructure\n\n| Module | Description | Usage Example |\n|--------|-------------|---------------|\n| \ud83c\udf10 **IP Lookup** | Comprehensive IP address intelligence including geolocation, ISP, ASN | `--ip 8.8.8.8` |\n| \ud83d\udd0d **WHOIS Lookup** | Domain registration information and ownership details | `--whois example.com` |\n| \ud83d\udccb **DNS Lookup** | DNS records analysis (A, AAAA, MX, TXT, NS) | `--dns google.com` |\n| \ud83d\udd04 **Reverse DNS** | Reverse DNS lookup for IP addresses | `--reverse 8.8.8.8` |\n| \ud83d\udd0c **Port Scanner** | Network port scanning and service detection | `--ports 192.168.1.1` |\n| \ud83d\udd10 **SSL Scanner** | SSL/TLS certificate analysis and security assessment | `--ssl example.com:443` |\n| \ud83c\udf0d **IP Range Scanner** | Scan IP ranges for active hosts | `--ip-scan 192.168.1.0/24` |\n| \ud83c\udfe2 **ASN Resolver** | Resolve ASN numbers to IP ranges | `--asn AS15169` |\n| \ud83c\udf10 **ISP Tracker** | Track IP addresses to ISP information | `--isp 8.8.8.8` |\n\n### Web Application Security\n\n| Module | Description | Usage Example |\n|--------|-------------|---------------|\n| \ud83d\udcc4 **HTTP Headers** | HTTP security headers analysis | `--headers https://example.com` |\n| \ud83e\udd16 **Robots Scanner** | Robots.txt file analysis and discovery | `--robots https://example.com` |\n| \ud83d\udcc1 **Directory Bruteforce** | Web directory and file discovery | `--dir-brute https://example.com` |\n| \ud83d\uddfa\ufe0f **Sitemap Parser** | XML sitemap parsing and analysis | `--sitemap https://example.com` |\n| \u26a1 **JS Endpoint Scanner** | JavaScript file analysis for API endpoints | `--js-endpoints https://example.com` |\n| \ud83c\udfa8 **Favicon Hash** | Generate favicon hashes for fingerprinting | `--favicon https://example.com` |\n| \ud83d\udd27 **Tech Fingerprint** | Web technology stack identification | `--tech https://example.com` |\n| \ud83d\udd0d **URL Analyzer** | URL threat analysis and reputation check | `--url https://suspicious-site.com` |\n| \ud83c\udf10 **User-Agent Detector** | User-Agent string analysis and detection | `--useragent \"Mozilla/5.0...\"` |\n\n### Social Media & Personal Intel\n\n| Module | Description | Usage Example |\n|--------|-------------|---------------|\n| \ud83d\udc65 **Social Checker** | Username availability across social platforms | `--social johndoe` |\n| \ud83d\udc19 **GitHub Intel** | GitHub user and repository intelligence | `--github octocat` |\n| \ud83d\udcf1 **Phone Intel** | Phone number intelligence and carrier info | `--phone +1234567890` |\n| \ud83d\udce7 **Email Validator** | Email address validation and domain analysis | `--email test@example.com` |\n| \ud83d\uddd1\ufe0f **Temp Email Checker** | Temporary/disposable email detection | `--temp-email test@tempmail.com` |\n\n### Document & Metadata Analysis\n\n| Module | Description | Usage Example |\n|--------|-------------|---------------|\n| \ud83d\udcf7 **EXIF Extractor** | Image metadata and EXIF data extraction | `--exif image.jpg` |\n| \ud83d\udcc4 **Doc Metadata** | Document metadata extraction (PDF, DOCX, etc.) | `--metadata document.pdf` |\n\n### Search & Discovery\n\n| Module | Description | Usage Example |\n|--------|-------------|---------------|\n| \ud83d\udd0d **Google Dorking** | Advanced Google search queries | `--dork \"site:example.com filetype:pdf\"` |\n| \ud83c\udf10 **Subdomain Finder** | Subdomain discovery and enumeration | `--subdomains example.com` |\n| \u23f0 **Wayback Machine** | Historical website data from Internet Archive | `--wayback example.com` |\n| \ud83d\udd77\ufe0f **Common Crawl** | Search Common Crawl web archive data | `--common-crawl example.com` |\n| \ud83d\udccb **Pastebin Search** | Search Pastebin for data dumps and leaks | `--pastebin searchterm` |\n| \ud83d\udcbe **Leak Search** | Data breach and leak detection | `--leak email@example.com` |\n| \ud83d\udcc2 **Google Drive Leaks** | Search for leaked Google Drive files | `--gdrive folderID` |\n| \ud83d\uddfa\ufe0f **Maps Parser** | Parse and analyze Google Maps links | `--maps \"https://maps.google.com/...\"` |\n\n### Threat Intelligence\n\n| Module | Description | Usage Example |\n|--------|-------------|---------------|\n| \ud83d\udee1\ufe0f **Shodan Lookup** | Shodan API integration for host intelligence | `--shodan 8.8.8.8` |\n\n---\n\n## \ud83d\udd11 API Key Configuration\n\nSome modules require API keys for enhanced functionality. BloodRecon now offers multiple convenient ways to configure your API keys:\n\n### Shodan API Key\n\n#### \ud83d\ude80 **Recommended Method: Command Line Setup (v1.2.0+)**\n\n1. **Get your free API key** at [Shodan.io](https://account.shodan.io/register)\n2. **Set it instantly with one command**:\n\n```bash\n# Set your Shodan API key (replaces any existing key)\npython3 bloodrecon.py --shodan-api \"your_shodan_api_key_here\"\n```\n\n3. **Start using Shodan immediately**:\n\n```bash\n# Your API key is now saved and ready to use!\npython3 bloodrecon.py --shodan 8.8.8.8\npython3 bloodrecon.py --shodan google.com\n```\n\n#### \ud83d\udcc1 **Configuration Details**\n- **Storage Location**: `~/.config-vritrasecz/bloodrecon-shodan.json`\n- **Auto Directory Creation**: Config directories are created automatically\n- **Key Replacement**: New keys seamlessly replace existing ones\n- **Persistent Storage**: API key is saved for all future sessions\n\n#### \ud83d\udd04 **Alternative Methods**\n\n**Environment Variable:**\n```bash\nexport SHODAN_API_KEY=\"your_api_key_here\"\npython3 bloodrecon.py --shodan 8.8.8.8\n```\n\n**Legacy config.py (still supported):**\n```python\n# modules/config.py\nSHODAN_API_KEY = 'your_shodan_api_key_here'\n```\n\n**Interactive Mode:**\n- The tool will prompt for the key if not configured\n- Entered keys are automatically saved for future use\n\n### API Key Security\n\n\ud83d\udd12 **Security Best Practices**:\n- \u2705 Use the `--shodan-api` command for secure local storage\n- \u2705 Use environment variables for server deployments\n- \u274c Never commit API keys to version control\n- \u274c Avoid hardcoding keys in scripts\n\n\ud83d\udca1 **Pro Tip**: The new JSON config system in v1.2.0 provides the most reliable and user-friendly API key management!\n\n---\n\n## \ud83d\udcf8 Screenshots\n\n### Interactive Menu\n\n\n---\n\n## \ud83d\udcc1 Folder Structure\n\n```plaintext\nBloodRecon/\n\u2502\n\u251c\u2500\u2500 \ud83d\udcc4 bloodrecon.py # Main application file\n\u251c\u2500\u2500 \ud83d\udcc4 requirements.txt # Python dependencies\n\u251c\u2500\u2500 \ud83d\udcc4 LICENSE # License File\n\u251c\u2500\u2500 \ud83d\udcc4 README.md # This file\n\u251c\u2500\u2500 \ud83d\udcc4 CHANGELOG.md # Version history and changes\n\u2502\n\u2514\u2500\u2500 \ud83d\udcc1 modules/ # OSINT modules directory\n \u251c\u2500\u2500 \ud83d\udcc1 list-imp/ # Important list\n \u2502 \u251c\u2500\u2500 \ud83d\udcc4 common.txt # Password list for Dir Bruteforce\n \u2502 \u2514\u2500\u2500 \ud83d\udcc4 temp-domains.txt # Temp mail domain list\n \u2502\n \u251c\u2500\u2500 \ud83d\udcc4 __init__.py # Module initialization\n \u251c\u2500\u2500 \ud83d\udcc4 colors.py # Color management and styling\n \u251c\u2500\u2500 \ud83d\udcc4 config.py # Configuration file (API keys)\n \u2502\n \u251c\u2500\u2500 \ud83c\udf10 Network & Infrastructure\n \u251c\u2500\u2500 \ud83d\udcc4 ip_lookup.py # IP address intelligence\n \u251c\u2500\u2500 \ud83d\udcc4 whois_lookup.py # WHOIS domain lookup\n \u251c\u2500\u2500 \ud83d\udcc4 dns_lookup.py # DNS records analysis\n \u251c\u2500\u2500 \ud83d\udcc4 reverse_dns.py # Reverse DNS lookup\n \u251c\u2500\u2500 \ud83d\udcc4 port_scanner.py # Port scanning functionality\n \u251c\u2500\u2500 \ud83d\udcc4 ssl_scanner.py # SSL certificate analysis\n \u251c\u2500\u2500 \ud83d\udcc4 ip_range_scanner.py # IP range scanning\n \u251c\u2500\u2500 \ud83d\udcc4 asn_resolver.py # ASN to IP range resolution\n \u251c\u2500\u2500 \ud83d\udcc4 isp_tracker.py # ISP tracking\n \u2502\n \u251c\u2500\u2500 \ud83d\udd12 Web Application Security\n \u251c\u2500\u2500 \ud83d\udcc4 http_headers.py # HTTP headers analysis\n \u251c\u2500\u2500 \ud83d\udcc4 robots_scanner.py # Robots.txt scanner\n \u251c\u2500\u2500 \ud83d\udcc4 directory_bruteforce.py # Directory bruteforcing\n \u251c\u2500\u2500 \ud83d\udcc4 sitemap_parser.py # Sitemap analysis\n \u251c\u2500\u2500 \ud83d\udcc4 js_endpoint_scanner.py # JavaScript endpoint discovery\n \u251c\u2500\u2500 \ud83d\udcc4 favicon_hash.py # Favicon hash generation\n \u251c\u2500\u2500 \ud83d\udcc4 tech_fingerprint.py # Technology fingerprinting\n \u251c\u2500\u2500 \ud83d\udcc4 url_analyzer.py # URL threat analysis\n \u251c\u2500\u2500 \ud83d\udcc4 useragent_detector.py # User-Agent analysis\n \u2502\n \u251c\u2500\u2500 \ud83d\udc65 Social & Personal Intel\n \u251c\u2500\u2500 \ud83d\udcc4 social_checker.py # Social media username check\n \u251c\u2500\u2500 \ud83d\udcc4 github_intel.py # GitHub intelligence\n \u251c\u2500\u2500 \ud83d\udcc4 phone_intel.py # Phone number analysis\n \u251c\u2500\u2500 \ud83d\udcc4 email_validator.py # Email validation\n \u251c\u2500\u2500 \ud83d\udcc4 temp_email_checker.py # Temporary email detection\n \u2502\n \u251c\u2500\u2500 \ud83d\udcc4 Document & Metadata Analysis\n \u251c\u2500\u2500 \ud83d\udcc4 exif_extractor.py # EXIF metadata extraction\n \u251c\u2500\u2500 \ud83d\udcc4 doc_metadata.py # Document metadata analysis\n \u2502\n \u251c\u2500\u2500 \ud83d\udd0d Search & Discovery\n \u251c\u2500\u2500 \ud83d\udcc4 google_dorking.py # Google dorking\n \u251c\u2500\u2500 \ud83d\udcc4 subdomain_finder.py # Subdomain discovery\n \u251c\u2500\u2500 \ud83d\udcc4 wayback_machine.py # Wayback Machine search\n \u251c\u2500\u2500 \ud83d\udcc4 common_crawl.py # Common Crawl search\n \u251c\u2500\u2500 \ud83d\udcc4 pastebin_search.py # Pastebin searching\n \u251c\u2500\u2500 \ud83d\udcc4 leak_search.py # Data breach search\n \u251c\u2500\u2500 \ud83d\udcc4 google_drive_leaks.py # Google Drive leak search\n \u251c\u2500\u2500 \ud83d\udcc4 maps_parser.py # Google Maps link parser\n \u2514\u2500\u2500 \ud83d\udcc4 shodan_lookup.py # Shodan API integration\n\n```\n\n---\n\n## \u2696\ufe0f Legal Disclaimer\n\n**\u26a0\ufe0f IMPORTANT**: This tool is designed exclusively for **educational purposes** and **authorized security testing**.\n\n### \u2705 Authorized Uses\n- Educational purposes and learning OSINT techniques\n- Authorized penetration testing and security assessments\n- Bug bounty programs with proper scope authorization\n- Digital forensics investigations by authorized personnel\n- Security research within legal boundaries\n\n### \u274c Prohibited Uses\n- Unauthorized surveillance or stalking\n- Illegal data collection or privacy violations\n- Malicious reconnaissance or attack preparation\n- Any activity violating local, state, or federal laws\n\n**Users are solely responsible for ensuring compliance with applicable laws and regulations in their jurisdiction.**\n\n---\n\n## \ud83d\udc68\u200d\ud83d\udcbb Author\n\n<div align=\"center\">\n <img src=\"https://github.com/VritraSecz.png\" width=\"100\" height=\"100\" style=\"border-radius: 50%;\">\n <h3>Alex Butler</h3>\n <p><strong>Vritra Security Organization</strong></p>\n</div>\n\n### \ud83c\udf10 Connect With Us\n\n+ [](https://vritrasec.com)\n+ [](https://vritrasec.com)\n+ [](https://github.com/VritraSecz)\n+ [](https://instagram.com/haxorlex)\n+ [](https://youtube.com/@Technolex)\n+ [](https://t.me/LinkCentralX)\n+ [](https://t.me/VritraSec)\n+ [](https://t.me/VritraSecz)\n+ [](https://t.me/ethicxbot)\n\n\n---\n\n## \ud83e\udd1d Contributing\n\nContributions are welcome! Here's how you can help:\n\n1. \ud83c\udf74 **Fork the repository**\n2. \ud83c\udf3f **Create a feature branch** (`git checkout -b feature/AmazingFeature`)\n3. \ud83d\udcbe **Commit your changes** (`git commit -m 'Add some AmazingFeature'`)\n4. \ud83d\udce4 **Push to the branch** (`git push origin feature/AmazingFeature`)\n5. \ud83d\udd04 **Open a Pull Request**\n\n### \ud83d\udca1 Ways to Contribute\n- \ud83d\udc1b Report bugs and issues\n- \ud83d\udca1 Suggest new features or modules\n- \ud83d\udcd6 Improve documentation\n- \ud83d\udd27 Add new OSINT modules\n- \ud83e\uddea Write tests\n- \ud83c\udf0d Translate to other languages\n\n\n\n---\n\n## \ud83d\udcc4 License\n\n\n### \ud83c\udff7\ufe0f MIT License \u2014 Permissions, Limitations & Requirements\n\n#### \u2705 Permissions\n\n+ \n+ \n+ \n+ \n\n#### \u274c Limitations\n\n+ \n+ \n\n#### \u26a0\ufe0f Requirements\n\n+ \n\n\n---\n\n<div align=\"center\">\n <p>\u2b50 If you found BloodRecon useful, please consider giving it a star!</p>\n <b>Made with \u2764\ufe0f by <a href=\"https://github.com/VritraSecz\">Alex Butler</a></b>\n</div>\n\n\n\n\n\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "Advanced OSINT Intelligence Framework for cybersecurity professionals",
"version": "1.2.1",
"project_urls": {
"Bug Reports": "https://github.com/VritraSecz/BloodRecon/issues",
"Developer Website": "https://vritrasec.com",
"Documentation": "https://github.com/VritraSecz/BloodRecon/blob/main/README.md",
"Homepage": "https://github.com/VritraSecz/BloodRecon",
"Repository": "https://github.com/VritraSecz/BloodRecon"
},
"split_keywords": [
"osint",
" reconnaissance",
" cybersecurity",
" intelligence",
" framework",
" penetration-testing"
],
"urls": [
{
"comment_text": null,
"digests": {
"blake2b_256": "b930cc73c07e6473f878cd8ce26bd85cbff464a3e9da561ab65d18c2264c48ab",
"md5": "947fdb68277a3e6587c980aa27220c41",
"sha256": "0ab6aa8ca0b60fa6e55c3f767c91581405720c85156abe5e4d43c2f928db5eb2"
},
"downloads": -1,
"filename": "bloodrecon-1.2.1-py3-none-any.whl",
"has_sig": false,
"md5_digest": "947fdb68277a3e6587c980aa27220c41",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.7",
"size": 145254,
"upload_time": "2025-07-31T21:50:51",
"upload_time_iso_8601": "2025-07-31T21:50:51.919372Z",
"url": "https://files.pythonhosted.org/packages/b9/30/cc73c07e6473f878cd8ce26bd85cbff464a3e9da561ab65d18c2264c48ab/bloodrecon-1.2.1-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": null,
"digests": {
"blake2b_256": "22c18c70fa5beb8559db5bf035e1070be60d307fafd4d423520a6a8ba7ba1ec2",
"md5": "b01fc5d0dd19a463e8169c0e26508898",
"sha256": "15e99c0dbe73b725d82ee765bb6a27b6f79ed2956eb5d86c744dd867a897b9e6"
},
"downloads": -1,
"filename": "bloodrecon-1.2.1.tar.gz",
"has_sig": false,
"md5_digest": "b01fc5d0dd19a463e8169c0e26508898",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.7",
"size": 132091,
"upload_time": "2025-07-31T21:50:53",
"upload_time_iso_8601": "2025-07-31T21:50:53.965351Z",
"url": "https://files.pythonhosted.org/packages/22/c1/8c70fa5beb8559db5bf035e1070be60d307fafd4d423520a6a8ba7ba1ec2/bloodrecon-1.2.1.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2025-07-31 21:50:53",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "VritraSecz",
"github_project": "BloodRecon",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"requirements": [
{
"name": "colorama",
"specs": [
[
"==",
"0.4.6"
]
]
},
{
"name": "dnspython",
"specs": [
[
"==",
"2.7.0"
]
]
},
{
"name": "mmh3",
"specs": [
[
"==",
"5.1.0"
]
]
},
{
"name": "phonenumbers",
"specs": [
[
"==",
"9.0.10"
]
]
},
{
"name": "Pillow",
"specs": [
[
"==",
"11.3.0"
]
]
},
{
"name": "requests",
"specs": [
[
"==",
"2.32.4"
]
]
},
{
"name": "shodan",
"specs": [
[
"==",
"1.31.0"
]
]
},
{
"name": "urllib3",
"specs": [
[
"==",
"2.5.0"
]
]
},
{
"name": "whois",
"specs": [
[
"==",
"1.20240129.2"
]
]
}
],
"lcname": "bloodrecon"
}