Advanced OSINT Toolkit

Uncover Hidden Data with BluePhoenix

BluePhoenix is a comprehensive open-source intelligence (OSINT) framework designed for security professionals, researchers, and ethical hackers to gather, analyze, and visualize digital intelligence from multiple sources.

Powerful Features

BluePhoenix combines multiple OSINT techniques into a single, easy-to-use platform with advanced capabilities for digital investigations.

Investigation Tools

IP Intelligence

Comprehensive IP analysis including geolocation, WHOIS data, port scanning, and network mapping capabilities.

Network Analysis Geolocation

Email Tracking

Verify email validity, check breach history, analyze headers, and trace email origins with advanced techniques.

Email Analysis Breach Data

Username Search

Cross-platform username lookup to find profiles across hundreds of social networks and websites.

Social Media

Security Tools

Vulnerability Scanner

Check software and systems against CVE databases to identify known vulnerabilities and security issues.

CVE Database Security

Hash Identifier

Recognize hash types and perform basic hash analysis.

Forensics

WiFi Analyzer

Scan wireless networks and detect security vulnerabilities.

Wireless Security

Comprehensive Modules

BluePhoenix offers a wide range of specialized modules for different OSINT tasks

Network Analysis

IP Coannler

Advanced IP analysis combining WHOIS, geolocation, and network scanning capabilities.

IP Analysis Network

IP Port Scanner

Comprehensive port scanning with service detection and vulnerability assessment.

Network Security

IP Pinger

Network connectivity testing with detailed statistics and latency analysis.

Network

IP Lookup

Detailed IP information including geolocation, ISP data, and threat intelligence.

Geolocation Network

Digital Forensics

Username Tracker

Find profiles across multiple platforms using a single username.

Social Media OSINT

Email Tracker

Analyze email addresses for breach history and associated accounts.

Email Security

Email Lookup

Verify email validity and extract metadata from email headers.

Email

Phone Lookup

Identify carrier information and geolocation for phone numbers.

Phone OSINT

Security Tools

Vulnerability Scanner

Check software versions against CVE databases for known vulnerabilities.

Security CVE

Hash Identifier

Recognize hash types and perform basic hash analysis.

Forensics

Breach Checker

Check if emails or passwords appear in known data breaches.

Security Privacy

WiFi Analyzer

Scan wireless networks and detect security vulnerabilities.

Wireless Security

Interactive Demo

See BluePhoenix in action with our command-line interface demo

Experience the Power

BluePhoenix provides a user-friendly command-line interface with color-coded output and intuitive navigation. Here's what you can expect:

  • Comprehensive module selection with detailed help
  • Real-time data processing and analysis
  • Automated reporting and logging capabilities
Get Started
bluephoenix --demo
BluePhoenix> select module ip_lookup
[+] Loaded IP Lookup module with 12 analysis methods
IP Lookup> analyze 8.8.8.8
[+] IP: 8.8.8.8
[+] Hostname: dns.google
[+] Location: Mountain View, US
[+] ISP: Google LLC
[+] Services: DNS, Anycast
IP Lookup> scan ports
[+] Scanning top 100 ports...
[+] Open ports: 53/tcp (DNS)
[+] Scan completed in 4.2s
IP Lookup> _
17+
Specialized Modules
100+
Data Sources
24/7
API Monitoring
Possibilities

Resources

Everything you need to get started with BluePhoenix

Documentation

Comprehensive documentation for all BluePhoenix modules and features.

Getting Started

To begin using BluePhoenix, follow these steps:

  1. Download the latest version from our downloads page
  2. Install the required dependencies (Python 3.8+)
  3. Run the main.py file to launch the interface

Module Overview

BluePhoenix is organized into several modules, each with specific functionality:

  • Network Analysis: IP tools, port scanning, network mapping
  • Digital Forensics: Email tracking, username search, phone lookup
  • Security Tools: Vulnerability scanning, hash identification
Download Full Documentation

API Reference

Technical reference for BluePhoenix's API integration capabilities.

API Endpoints

BluePhoenix integrates with several third-party APIs:

  • IP Geolocation: ip-api.com
  • Breach Data: Have I Been Pwned API
  • CVE Database: NVD API

Example API Call

import requests

def check_breaches(email):
    headers = {"User-Agent": "BluePhoenix"}
    response = requests.get(
        f"https://haveibeenpwned.com/api/v3/breachedaccount/{email}",
        headers=headers
    )
    if response.status_code == 200:
        return response.json()
    return None

Rate Limits

Be mindful of API rate limits when using BluePhoenix:

  • ip-api.com: 45 requests per minute
  • Have I Been Pwned: 1 request every 1.5 seconds
  • NVD API: 5 requests in 30 seconds

Tutorials

Step-by-step guides to help you master BluePhoenix.

Basic Usage

Running a port scan:

  1. Launch BluePhoenix
  2. Select "IP Port Scanner" from the menu
  3. Enter target IP address
  4. Specify port range (e.g., 1-100)
  5. Review results

Video Tutorials

Getting Started with BluePhoenix

15 min | Beginner

Advanced Network Analysis

28 min | Intermediate

Security Best Practices

22 min | Advanced

View All Tutorials

Community

Connect with other BluePhoenix users and developers.

Join the Discussion

Our community is active on these platforms:

GitHub

Report issues and contribute

Discord

Real-time chat with users

Reddit

Community discussions

Community Guidelines

To maintain a positive community environment:

  • Be respectful to all members
  • Keep discussions relevant to BluePhoenix
  • No illegal activity or hacking discussions
  • Help others when you can

Ready to Elevate Your OSINT Game?

Download BluePhoenix today and gain access to the most comprehensive open-source intelligence toolkit available. Completely free and open-source.