Skip to content

Wizbisy/twilight-orbit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

9 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸŒ‘ Twilight Orbit

Automated OSINT Recon Tool | See What's Hidden in the Shadows

Python 3.10+ License: MIT PRs Welcome Platform

A powerful, modular OSINT reconnaissance tool designed specifically for bug bounty hunters, and security researchers.
Powered by real free APIs: AlienVault OTX, URLScan.io, Internet Archive, ThreatFox, Shodan, SecurityTrails and more. πŸ”


(ASCII Art placeholder)

  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•—    β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—β–ˆβ–ˆβ•—     β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•—  β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
  β•šβ•β•β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•‘    β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β• β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β•šβ•β•β–ˆβ–ˆβ•”β•β•β•
     β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘ β–ˆβ•— β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘   
     β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘   
     β–ˆβ–ˆβ•‘   β•šβ–ˆβ–ˆβ–ˆβ•”β–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘   
     β•šβ•β•    β•šβ•β•β•β•šβ•β•β• β•šβ•β•β•šβ•β•β•β•β•β•β•β•šβ•β• β•šβ•β•β•β•β•β• β•šβ•β•  β•šβ•β•   β•šβ•β•   
           β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—
          β–ˆβ–ˆβ•”β•β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β•šβ•β•β–ˆβ–ˆβ•”β•β•β•
          β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘   
          β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘   
          β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘   
           β•šβ•β•β•β•β•β• β•šβ•β•  β•šβ•β•β•šβ•β•β•β•β•β• β•šβ•β•   β•šβ•β•   

πŸ“– Table of Contents


⚑ Features

Twilight Orbit runs 12 parallel modules to extract every drop of public intelligence on a target.

Module Description Data Sources / Libraries
πŸ” DNS Lookup A, AAAA, MX, NS, TXT, CNAME, SOA records. dnspython
πŸ“‹ WHOIS Domain registration, registrar, dates, nameservers, status. python-whois
🌐 Subdomains Discovers hidden subdomains via active brute-forcing and passive certificate transparency logs. dnspython, crt.sh, SecurityTrails API
πŸ”“ Port Scanner Lightning fast TCP connect scanner for the Top 100 most common vulnerable ports. socket (stdlib)
πŸ›‘οΈ HTTP Headers Security header analysis with severity ratings (HSTS, CSP, Clickjacking, MIME-sniffing). httpx
πŸ”’ SSL/TLS Certificate details, issuer, SANs, expiry dates, cipher suites, and protocol versions. ssl, socket
βš™οΈ Tech Detection Fingerprints frameworks, CMS, CDNs, and analytics via HTTP response headers. httpx
🌍 Geolocation Finds the physical location, ISP, and ASN for the target IP address. ip-api.com
πŸ“§ Email Harvest Discovers employee and corporate emails via web scraping and public databases. Custom scraper, Hunter.io API
πŸ•°οΈ Wayback Machine Searches the Internet Archive for historical snapshots and hidden paths. archive.org CDX API
πŸ—οΈ Wayback Secrets Scans historical .env, .json, and .sql file archives for leaked API keys (AWS, Google, Stripe). archive.org CDX API
🎭 DOM Fingerprint Bypasses WAFs via Headless Chromium to detect hidden JavaScript frontend frameworks. playwright
πŸ”— Dependency Analyzer Parses client-side scripts to identify outdated libraries with known CVEs (e.g. ancient jQuery). httpx, regex
🚨 Threat Intel Cross-references the domain against global threat intelligence feeds. AlienVault OTX, URLScan.io, ThreatFox, HackerTarget
πŸ”Ž Shodan / VT Queries the biggest cybersecurity databases for vulnerabilities and malware reputation. Shodan, VirusTotal, AbuseIPDB

πŸš€ Quick Start

1. Requirements

  • Python 3.10+
  • Works on Windows, macOS, and Linux

2. Installation

The fastest way to get started is to clone the repository and set up a virtual environment.

# Clone the repository
git clone https://github.com/WIzbisy/twilight-orbit.git
cd twilight-orbit

# Create a virtual environment (Recommended)
python -m venv venv

# Activate the virtual environment
# On Windows:
.\venv\Scripts\activate
# On Linux/Mac:
source venv/bin/activate

# Install the required dependencies
pip install -r requirements.txt

πŸ’» Usage Examples

Twilight Orbit is built on top of click for a clean, intuitive command-line interface.

Running a Full Scan

Run all 12 modules against a target domain.

python -m twilight_orbit scan example.com

Targeted Scans

Only care about subdomains and open ports? Use the --modules (or -m) flag.

python -m twilight_orbit scan example.com -m subdomains,ports,dns

Generating Beautiful Reports

Twilight Orbit generates interactive HTML reports that are perfect for delivering to clients or bug bounty programs.

# Output results to an HTML file
python -m twilight_orbit scan example.com --output report.html

# Output results to machine-readable JSON (useful for CI/CD or jq parsing)
python -m twilight_orbit scan example.com --output results.json

Help Menu

View all available commands and modules.

python -m twilight_orbit --help
python -m twilight_orbit modules

πŸ”‘ Optional API Keys / Environmental Variables

Twilight Orbit performs highly effective reconnaissance out-of-the-box with zero configuration. However, you can turbocharge the modules by providing API keys for premium (but free-tier) services.

Twilight Orbit uses python-dotenv to automatically load keys. Create a .env file in the root directory like this:

# ─── Threat Intelligence ──────────────────────────────────────────
# Enhances the port scanner and checks for known CVEs
SHODAN_API_KEY=your_shodan_key_here

# Checks the target against 70+ antivirus engines
VIRUSTOTAL_API_KEY=your_vt_key_here

# Checks if the target IP has been reported for malicious activity
ABUSEIPDB_API_KEY=your_abuseipdb_key_here

# ─── Recon Enhancements ─────────────────────────────────────────
# Pulls from Hunter's massive database of corporate emails
HUNTER_API_KEY=your_hunter_key_here

# Pulls thousands of historical subdomains from DNS history
SECURITYTRAILS_API_KEY=your_securitytrails_key_here

Where to get free keys:


πŸ“Š Output Formats

  1. Terminal (Rich): Beautiful, color-coded tables, progress bars, and panels rendered natively in your terminal using the rich library.
  2. HTML Report: A stunning, self-contained, dark-themed HTML report. It parses the data into clean tables with security score widgets.
  3. JSON: A complete data dump for building automation pipelines.

πŸ—οΈ Project Architecture

If you want to contribute or build your own modules, here is the architecture:

twilight-orbit/
β”œβ”€β”€ twilight_orbit/
β”‚   β”œβ”€β”€ cli.py               # CLI entry point (Click)
β”‚   β”œβ”€β”€ scanner.py           # Orchestrator that runs the modules in parallel
β”‚   β”œβ”€β”€ config.py            # Global configuration & constants
β”‚   β”œβ”€β”€ modules/
β”‚   β”‚   β”œβ”€β”€ dns_lookup.py    # DNS records module
β”‚   β”‚   β”œβ”€β”€ whois_lookup.py  # WHOIS data module
β”‚   β”‚   β”œβ”€β”€ subdomains.py    # Subdomain discovery (crt.sh & SecurityTrails)
β”‚   β”‚   β”œβ”€β”€ port_scanner.py  # Top 100 ports scanner
β”‚   β”‚   β”œβ”€β”€ http_headers.py  # Security headers analyzer
β”‚   β”‚   β”œβ”€β”€ ssl_info.py      # SSL/TLS cert evaluator
β”‚   β”‚   β”œβ”€β”€ tech_detect.py   # Tech fingerprinting
β”‚   β”‚   β”œβ”€β”€ geo_lookup.py    # IP geolocation
β”‚   β”‚   β”œβ”€β”€ email_harvest.py # Email discovery (Scraping & Hunter.io)
β”‚   β”‚   β”œβ”€β”€ wayback.py       # Wayback Machine API
β”‚   β”‚   β”œβ”€β”€ wayback_secrets.py # Historical API Key detection
β”‚   β”‚   β”œβ”€β”€ dom_fingerprint.py # Headless browser framework detection
β”‚   β”‚   β”œβ”€β”€ dependency_chain.py# Frontend vulnerable libs check
β”‚   β”‚   β”œβ”€β”€ threat_intel.py  # AlienVault OTX, URLScan, ThreatFox
β”‚   β”‚   └── shodan_vt.py     # Shodan, VirusTotal, AbuseIPDB
β”‚   └── reporting/
β”‚       β”œβ”€β”€ console.py       # Terminal rendering logic (Rich)
β”‚       β”œβ”€β”€ json_report.py   # JSON export logic
β”‚       └── html_report.py   # HTML template and rendering
β”œβ”€β”€ tests/                   # (Optional) Unit tests structure
β”œβ”€β”€ requirements.txt         # Project dependencies
β”œβ”€β”€ .env                     # (You create this) API Keys
β”œβ”€β”€ .gitignore               # Ignored files for git
β”œβ”€β”€ setup.py                 # Package setup and installation
β”œβ”€β”€ CONTRIBUTING.md          # Guide for contributors
β”œβ”€β”€ LICENSE                  # MIT License
└── README.md                # Project documentation

🀝 Contributing

We welcome contributions! Please see the CONTRIBUTING.md file for guidelines on how to add new modules, fix bugs, or improve documentation.

βš–οΈ Disclaimer

⚠️ Twilight Orbit is intended for authorized security testing, educational purposes.

You must only scan targets that you own or have explicit written permission to test (e.g., Bug Bounty programs). Unauthorized scanning of infrastructure may be illegal in your jurisdiction. The authors and maintainers are not responsible for any misuse of this tool.

πŸ“„ License

This project is licensed under the MIT License.

About

Twilight Orbit is an automated, modular OSINT reconnaissance tool designed to uncover hidden infrastructure, subdomains, open ports, and threat intelligence for any target domain.

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages