Uncover Hidden Data with BluePhoenix
BluePhoenix is a comprehensive open-source intelligence (OSINT) framework designed for security professionals, researchers, and ethical hackers to gather, analyze, and visualize digital intelligence from multiple sources.
Powerful Features
BluePhoenix combines multiple OSINT techniques into a single, easy-to-use platform with advanced capabilities for digital investigations.
Investigation Tools
IP Intelligence
Comprehensive IP analysis including geolocation, WHOIS data, port scanning, and network mapping capabilities.
Email Tracking
Verify email validity, check breach history, analyze headers, and trace email origins with advanced techniques.
Username Search
Cross-platform username lookup to find profiles across hundreds of social networks and websites.
Security Tools
Vulnerability Scanner
Check software and systems against CVE databases to identify known vulnerabilities and security issues.
Hash Identifier
Recognize hash types and perform basic hash analysis.
WiFi Analyzer
Scan wireless networks and detect security vulnerabilities.
Comprehensive Modules
BluePhoenix offers a wide range of specialized modules for different OSINT tasks
Network Analysis
IP Coannler
Advanced IP analysis combining WHOIS, geolocation, and network scanning capabilities.
IP Port Scanner
Comprehensive port scanning with service detection and vulnerability assessment.
IP Pinger
Network connectivity testing with detailed statistics and latency analysis.
IP Lookup
Detailed IP information including geolocation, ISP data, and threat intelligence.
Digital Forensics
Username Tracker
Find profiles across multiple platforms using a single username.
Email Tracker
Analyze email addresses for breach history and associated accounts.
Email Lookup
Verify email validity and extract metadata from email headers.
Phone Lookup
Identify carrier information and geolocation for phone numbers.
Security Tools
Vulnerability Scanner
Check software versions against CVE databases for known vulnerabilities.
Hash Identifier
Recognize hash types and perform basic hash analysis.
Breach Checker
Check if emails or passwords appear in known data breaches.
WiFi Analyzer
Scan wireless networks and detect security vulnerabilities.
Interactive Demo
See BluePhoenix in action with our command-line interface demo
Experience the Power
BluePhoenix provides a user-friendly command-line interface with color-coded output and intuitive navigation. Here's what you can expect:
- Comprehensive module selection with detailed help
- Real-time data processing and analysis
- Automated reporting and logging capabilities
[+] Hostname: dns.google
[+] Location: Mountain View, US
[+] ISP: Google LLC
[+] Services: DNS, Anycast
[+] Open ports: 53/tcp (DNS)
[+] Scan completed in 4.2s
Resources
Everything you need to get started with BluePhoenix
Documentation
Comprehensive documentation for all BluePhoenix modules and features.
Getting Started
To begin using BluePhoenix, follow these steps:
- Download the latest version from our downloads page
- Install the required dependencies (Python 3.8+)
- Run the main.py file to launch the interface
Module Overview
BluePhoenix is organized into several modules, each with specific functionality:
- Network Analysis: IP tools, port scanning, network mapping
- Digital Forensics: Email tracking, username search, phone lookup
- Security Tools: Vulnerability scanning, hash identification
API Reference
Technical reference for BluePhoenix's API integration capabilities.
API Endpoints
BluePhoenix integrates with several third-party APIs:
- IP Geolocation: ip-api.com
- Breach Data: Have I Been Pwned API
- CVE Database: NVD API
Example API Call
import requests def check_breaches(email): headers = {"User-Agent": "BluePhoenix"} response = requests.get( f"https://haveibeenpwned.com/api/v3/breachedaccount/{email}", headers=headers ) if response.status_code == 200: return response.json() return None
Rate Limits
Be mindful of API rate limits when using BluePhoenix:
- ip-api.com: 45 requests per minute
- Have I Been Pwned: 1 request every 1.5 seconds
- NVD API: 5 requests in 30 seconds
Tutorials
Step-by-step guides to help you master BluePhoenix.
Basic Usage
Running a port scan:
- Launch BluePhoenix
- Select "IP Port Scanner" from the menu
- Enter target IP address
- Specify port range (e.g., 1-100)
- Review results
Video Tutorials
Getting Started with BluePhoenix
15 min | Beginner
Advanced Network Analysis
28 min | Intermediate
Security Best Practices
22 min | Advanced
Community
Connect with other BluePhoenix users and developers.
Join the Discussion
Our community is active on these platforms:
Community Guidelines
To maintain a positive community environment:
- Be respectful to all members
- Keep discussions relevant to BluePhoenix
- No illegal activity or hacking discussions
- Help others when you can
Legal Information
Important legal documents and guidelines for using BluePhoenix.
License
BluePhoenix is released under the MIT License:
MIT License Copyright (c) 2023 BluePhoenix Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
Terms of Use
By using BluePhoenix, you agree to:
- Use the tool only for legal and ethical purposes
- Not use it against systems you don't own or have permission to test
- Comply with all applicable laws in your jurisdiction
Privacy Policy
BluePhoenix respects your privacy:
- We don't collect personal information
- All searches are performed locally by default
- API calls are made directly from your machine
Ethical Guidelines
As a security tool, BluePhoenix must be used responsibly:
- Always get proper authorization before testing systems
- Respect privacy and data protection laws
- Report vulnerabilities responsibly
- Never use the tool for malicious purposes
Ready to Elevate Your OSINT Game?
Download BluePhoenix today and gain access to the most comprehensive open-source intelligence toolkit available. Completely free and open-source.