"Forged at the intersection of artificial intelligence and offensive cybersecurity."
RedCalibur is a professional, AI-powered red teaming toolkit designed to automate and enhance various phases of penetration testing, with a primary focus on comprehensive OSINT (Open Source Intelligence) reconnaissance. It leverages machine learning and large language models (LLMs) to supercharge ethical hacking workflows.
This project serves both as a practical cybersecurity tool and as a demonstration of applying neural networks and AI in cybersecurity for academic purposes.
Prerequisites
- Python 3.10+ (3.11/3.12/3.13 supported)
- Node.js 18+ and npm
- Clone and enter the folder
git clone https://github.com/PraneeshRV/RedCalibur.git
cd RedCalibur- Create and activate a virtual environment, install deps
python3 -m venv .venv
source .venv/bin/activate
python -m pip install -U pip setuptools wheel
python -m pip install -r requirements.txt
python -m pip install -r api/requirements.txt- Configure environment variables (optional but recommended)
cp .env.example .env
# edit .env and add keys as needed: SHODAN_API_KEY, VIRUSTOTAL_API_KEY, GEMINI_API_KEY- Start the backend API (runs in background)
chmod +x scripts/*.sh
./scripts/start_api.sh
# Health check: http://127.0.0.1:8000/health- Start the frontend (development)
cd frontend
npm install
npm run dev
# App: http://localhost:5173 (Vite may choose 5174 if 5173 is busy)Stop the backend
./scripts/stop_api.shOptional: run tests
python -m pytest tests/RedCalibur integrates traditional red teaming techniques with modern AI, offering a wide array of capabilities.
- Domain & Infrastructure Analysis:
- WHOIS Lookup: Comprehensive domain registration information.
- DNS Enumeration: Discovery of A, AAAA, MX, TXT, CNAME, and NS records.
- Subdomain Discovery: Automated enumeration using multiple techniques.
- SSL/TLS Analysis: Certificate details and security configuration assessment.
- Port Scanning: Intelligent scanning for open ports and services.
- Threat Intelligence Integration:
- Shodan: Discover internet-facing devices, services, and vulnerabilities.
- VirusTotal: Analyze domains and IPs for known malicious activity.
- Search & Data Mining:
- Google Dorking: Automate advanced search queries to find sensitive information.
- Leak Detection: Search Pastebin and GitHub for potential data leaks (placeholder).
- Dark Web Mentions: Search for mentions on the dark web (placeholder).
- Image & File OSINT:
- EXIF Metadata Extraction: Extract hidden data from images.
- Document Metadata Analysis: Analyze metadata from PDF documents.
- Reverse Image Search: Find where an image appears online (placeholder).
- Social Media Reconnaissance:
- Username Footprinting: Multi-platform probes via direct HTTP checks (no external CLI required).
- LinkedIn Scraping: Scrape company and employee data (placeholder).
- Twitter OSINT: Analyze user data and activity (placeholder).
- Username Footprinting: Multi-platform probes via direct HTTP checks (no external CLI required).
- AI-Powered Phishing Detection:
- Custom Neural Networks: A PyTorch-based classifier for URL and feature analysis.
- Ensemble Methods: Combines a Random Forest and Neural Network for improved accuracy and robustness.
- Advanced Feature Engineering: Extracts over 10 features from URLs, including Shannon entropy and domain structure, for precise analysis.
- Intelligent Analysis & Reporting:
- LLM Integration: Leverages large language models (e.g., Gemini) for contextual understanding and summarization.
- Automated Risk Scoring: AI-driven assessment to prioritize findings.
- Professional Report Generation: Automatically create summary reports in PDF and JSON formats.
RedCalibur/
βββ redcalibur/
β βββ ai_core/ # Core AI and LLM integration
β βββ cli.py # Main CLI interface
β βββ config.py # Configuration and environment loading
β βββ osint/
β β βββ ai_enhanced/ # AI-powered summarization, risk scoring, reporting
β β βββ domain_infrastructure/ # WHOIS, DNS, subdomains, SSL, tech stack, etc.
β β βββ image_file_osint/ # EXIF, document metadata, reverse image search
β β βββ network_threat_intel/ # Shodan, vuln scan, ASN, passive DNS
β β βββ search_engine_data_mining/ # Google dorking, dark web, leak search
β β βββ social_media_recon/ # Twitter, LinkedIn, Facebook/Instagram OSINT
β β βββ user_identity/ # Username, email, phone, breach lookups
β β βββ virustotal_integration.py # VirusTotal API integration
β βββ phishing_detection/ # AI phishing detection models
β βββ prompt_injection/ # LLM security testing (future)
β βββ payload_generation/ # AI payload creation (future)
β βββ reconnaissance/ # AI-powered recon (future)
β βββ reporting/ # (Reserved for future reporting modules)
βββ models/ # Saved AI models
βββ data/ # Training datasets
βββ reports/ # Output reports (PDF, JSON, Markdown)
βββ README.md
βββ requirements.txt
βββ test.py # Component testing
# Quick demo
.venv/bin/python demo.py phishing --simple
# Test all components
.venv/bin/python test.py
# Custom URL analysis
.venv/bin/python demo.py phishing --url "your-url-here"The toolkit is now ready for demonstration, testing, and further development for your AI and Neural Networks coursework!
git clone https://github.com/PraneeshRV/RedCalibur.git
cd RedCalibur
pip install -e .pip install redcalibur# Create virtual environment (recommended)
python -m venv redcalibur-env
source redcalibur-env/bin/activate # Linux/Mac
# redcalibur-env\Scripts\activate # Windows
# Install dependencies
pip install -r requirements.txtUse .env at the project root (copy from .env.example). Keys are optional but enable richer results.
Core keys used by the current API/UI
- SHODAN_API_KEY: Enables Shodan enrichment on network scan
- VIRUSTOTAL_API_KEY: Enables full URL malware scanning; without it, a basic URL health check is used
- GEMINI_API_KEY: Enables AI summarization of recon data (Google Generative AI)
Additional optional variables in .env.example are for future/extended tooling (e.g., Hunter.io, OpenAI/Anthropic); they are not required to run the local UI and core flows.
redcalibur config --check
redcalibur config --show# Complete domain analysis
redcalibur domain --target example.com --all
# Specific checks
redcalibur domain --target example.com --whois --dns --ssl
redcalibur domain --target example.com --subdomains# Port scanning
redcalibur scan --target 192.168.1.1 --ports 80,443,22,21
# Shodan integration
redcalibur scan --target example.com --shodan# Multi-platform username lookup
redcalibur username --target johndoe --platforms twitter,linkedin,github
# All supported platforms
redcalibur username --target johndoe# Scan a URL for malicious activity using VirusTotal
redcalibur urlscan --url http://example.com# Extract metadata from a PDF document
redcalibur file-osint extract-doc-meta --path /path/to/document.pdf
# Extract EXIF data from an image
redcalibur file-osint extract-exif --path /path/to/image.jpg# Run all functionalities and generate a summary report
redcalibur all --target-domain example.com --target-ip 192.168.1.1 --username johndoe --platforms twitter,linkedin --output summary_report# Fully automated, interactive OSINT process
redcalibur auto-recon# Generate comprehensive reports
redcalibur report --input results.json --format pdf
redcalibur report --input results.json --format both --output custom_name{
"target": "example.com",
"timestamp": "2025-09-08T01:48:00",
"whois": {
"registrar": "Example Registrar",
"creation_date": "2000-01-01",
"expiration_date": "2026-01-01"
},
"dns": {
"A": ["93.184.216.34"],
"MX": ["mail.example.com"]
},
"ssl": {
"issuer": "DigiCert Inc",
"notAfter": "2025-12-31",
"subjectAltName": ["example.com", "www.example.com"]
},
"ai_summary": "Target shows standard configuration with valid SSL certificate expiring in 2025...",
"risk_score": 0.3
}git clone https://github.com/PraneeshRV/RedCalibur.git
cd RedCalibur
python -m venv dev-env
source dev-env/bin/activate
pip install -e ".[dev]"python -m pytest tests/- Educational Purpose: Designed for security professionals and researchers
- Legal Compliance: Ensure you have proper authorization before testing
- Ethical Guidelines: Follow responsible disclosure practices
- Rate Limiting: Built-in delays to respect target systems
We welcome contributions!
This project is licensed under the MIT License - see the LICENSE file for details.
- Issues: Bug Reports
- Discussions: Community
- Inspired by the cybersecurity community
- Built with modern AI/ML technologies
- Designed for the next generation of security professionals
RedCalibur - Forging the future of automated red teaming βοΈ
This repository includes a lightweight API server and a modern React dashboard.
- Copy
.env.exampleto.envand fill keys as needed (optional). - Install deps (see Quickstart above) and run:
Dev (foreground, auto-reload):
python -m api.runBackground (recommended local service):
chmod +x scripts/*.sh
./scripts/start_api.sh
# Stop with: ./scripts/stop_api.shAPI default: http://127.0.0.1:8000 (health: /health).
In a second terminal:
cd frontend
npm install
npm run devApp is served at http://localhost:5173 (or 5174) and proxies /api/* to http://127.0.0.1:8000 in development.
- Neon-red cyber theme, accessible contrast, responsive layout
- Domain recon (WHOIS, DNS, subdomains, SSL), AI summary and basic risk score
- Network scan with optional Shodan enrichment
- Username lookup (direct HTTP probes; no Sherlock dependency)
- URL malware scan (VirusTotal)
Note: Keys are optional. Shodan and VirusTotal enrich results when provided. Gemini powers AI summaries.
If you prefer the backend to run automatically on boot:
- Review and, if needed, edit
deploy/systemd/redcalibur.servicepaths. - Install and enable the service:
sudo cp deploy/systemd/redcalibur.service /etc/systemd/system/
sudo systemctl daemon-reload
sudo systemctl enable redcalibur
sudo systemctl start redcalibur- Check status and logs:
systemctl status redcalibur --no-pager
journalctl -u redcalibur -n 100 --no-pager- Backend health check: http://127.0.0.1:8000/health
- Frontend canβt reach API in dev: ensure the backend is running and Vite proxy is active
- Port conflicts: Vite will choose another port (5174) if 5173 is busy; change API port with
--portinapi/run.pyif needed - Scripts say venv missing: create the venv at
.venvand install requirements (see Quickstart) - Missing keys: the app will still run, but some features return reduced data