A comprehensive security reconnaissance and assessment tool for ethical hacking and penetration testing.
- Phone Number Information - Carrier details, geolocation, timezone analysis
- Domain Information - DNS records, SSL certificates, WHOIS data, subdomain discovery
- Social Media Detection - Username and domain presence across platforms
- IP Address Information - Geolocation, reverse DNS, threat intelligence
- Email Address Analysis - Validation, domain analysis, breach checking
- Simple IP Info - Quick IP/domain information using ip-api.com
- Network Scanner - TCP/UDP port scanning, service identification
- Port Scanner - Individual port analysis with banner grabbing
- Vulnerability Scanner - Web application security assessment
- Vulnerability Assessment - Comprehensive security analysis
- Security Monitoring - Network activity monitoring and anomaly detection
- Threat Analysis - IP and domain reputation checking
- Intrusion Detection - System event analysis and file integrity monitoring
- System Information - Comprehensive system details
- DDoS Defense Simulation - Analyze and test DDoS protection mechanisms
- Python 3.8+
- Windows/Linux/macOS
- Internet connection for API calls
Download the latest ExploitEye.exe from releases and run directly.
- Phone Number Information - Analyze phone numbers for carrier and location data
- Domain Information - Comprehensive domain reconnaissance
- Social Media Detection - Find social media profiles
- Network Scanner - Scan networks and hosts
- Vulnerability Scanner - Web application security testing
- IP Address Information - IP geolocation and threat analysis
- Email Address Analysis - Email validation and breach checking
- Port Scanner - Individual port analysis
- System Information - System details and configuration
- Security Monitoring - Network activity monitoring
- Threat Analysis - Reputation and threat intelligence
- Intrusion Detection - System security monitoring
- Vulnerability Assessment - Comprehensive security assessment
- Simple IP Info - Quick IP/domain information lookup
- DDoS Defense Simulation - Analyze DDoS protection mechanisms
- Exit - Close the application
Enter phone number: +1234567890
{
"phone_number": "+1234567890",
"carrier_info": {
"carrier": "Verizon Wireless",
"line_type": "mobile",
"country_code": "US",
"country_name": "United States"
},
"geolocation": {
"country": "United States",
"region": "California",
"city": "Los Angeles",
"timezone": "America/Los_Angeles"
}
}Enter domain: example.com
{
"domain": "example.com",
"dns_records": {
"A": ["93.184.216.34"],
"MX": ["mail.example.com"],
"NS": ["ns1.example.com", "ns2.example.com"]
},
"ssl_info": {
"issuer": "DigiCert Inc",
"valid_until": "2024-12-31",
"subject_alt_names": ["example.com", "www.example.com"]
},
"whois_info": {
"registrar": "ICANN",
"creation_date": "1995-08-14",
"expiration_date": "2024-08-13"
}
}Enter target domain: example.com
{
"target": "example.com",
"simulation_type": "comprehensive",
"rate_limiting_analysis": {
"detected": true,
"mechanisms": ["HTTP 429 Rate Limiting", "Response Time Throttling"]
},
"cdn_analysis": {
"detected": true,
"provider": "Cloudflare",
"protection_level": "High"
},
"firewall_detection": {
"detected": true,
"type": "Web Application Firewall (WAF)",
"protection_level": "High"
},
"defense_recommendations": {
"risk_assessment": {
"level": "Low",
"score": 7,
"description": "Good DDoS protection in place"
}
}
}- For Educational Purposes Only: This tool is designed for ethical hacking and security research
- Legal Compliance: Always obtain proper authorization before testing systems
- Responsible Disclosure: Report vulnerabilities to system owners
- No Malicious Use: Do not use for unauthorized access or attacks
- Use only on systems you own or have explicit permission to test
- Follow responsible disclosure guidelines
- Respect rate limits and terms of service for APIs
- Keep API keys secure and private
- Permission Errors: Run with appropriate permissions for network scanning
- API Errors: Verify API keys are correct and active
- Network Issues: Ensure internet connection for API calls
- Firewall Blocking: Check firewall settings for network scanning features
- Check the console output for error messages
- Verify API keys are correct and active
- Ensure internet connection for API calls
- Check firewall settings for network scanning features
- Real-time connection monitoring
- Suspicious activity detection
- Port scan detection
- Network anomaly analysis
- IP and domain reputation checking
- Malware indicator analysis
- Phishing detection heuristics
- Blacklist monitoring
- System event analysis
- Process monitoring
- File integrity checking
- Security recommendations
- Web vulnerability scanning
- Network service analysis
- Configuration issue detection
- SSL/TLS security analysis
- Rate limiting detection
- Traffic pattern analysis
- Load balancing identification
- CDN protection analysis
- Firewall and WAF detection
- Defense recommendations
requests- HTTP requestscolorama- Terminal color outputpython-dotenv- Environment variable managementdnspython- DNS resolutionpython-whois- WHOIS data retrievalpyOpenSSL- SSL/TLS analysispsutil- System and process monitoring
This tool is designed for:
- Authorized security testing on systems you own or have permission to test
- Educational purposes in controlled environments
- Security research with proper authorization
- Penetration testing with written consent
Important: Always obtain proper authorization before testing any system. Unauthorized testing is illegal and unethical.
This project is licensed under the MIT License.
This tool is for educational and authorized security testing purposes only. Users are responsible for ensuring they have proper authorization before using this tool on any systems. The authors are not responsible for any misuse or damage caused by this tool.
For support, questions, or feature requests:
- Create an issue on GitHub
- Check the troubleshooting section
- Ensure you're using the latest version
- Contact on Discord
Remember: Always use this tool ethically and legally. Only test systems you own or have explicit permission to test.
Made by NotGamerPratham for the security community