8000 GitHub - franckferman/Bikochu: 🪲 Bikōchū (微香虫) - DIY Self-Hosted Shodan-Like. Remember, track, uncover: The shinobi way of Bikōchū's scanning.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

🪲 Bikōchū (微香虫) - DIY Self-Hosted Shodan-Like. Remember, track, uncover: The shinobi way of Bikōchū's scanning.

License

Notifications You must be signed in to change notification settings

franckferman/Bikochu

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

Contributors Forks Stargazers Issues License

Bikochu Logo without background

🪲 Bikōchū (微香虫)

DIY Self-Hosted Shodan-Like.
Remember, track, uncover: The shinobi way of Bikōchū's scanning.

📜 Table of Contents

Click to collapse/expand
  1. 📖 About
  2. ⚖️ Legal Disclaimer
  3. 📜 License
  4. 📞 Contact

📖 About

Bikōchū (微香虫) is a DIY offensive Shodan-like scanner, fully self-hosted, designed for deep Internet-wide reconnaissance, vulnerability hunting, and exploitation.

Inspired by the "scent bug" from Naruto, Bikōchū's mission is simple: sniff out what others don't see — exposed services, weak configurations, vulnerabilities, and exploitation vectors — on a massive scale.

Unlike traditional scanners, Bikōchū is built for offensive capabilities, combining exploits, vulnerability scraping, OSINT, and large-scale reconnaissance into a modular, multi-language framework.

Origin and Vision

Bikōchū was originally inspired by a Military Interest Intelligence project (RIM — Renseignement d'Intérêt Militaire), developed with colleagues and focused on reconnaissance, large-scale data aggregation, and military target analysis.

During that time, I developed an initial minimalist tool, far from perfect but adapted to our specific operational needs.

⚙️ Bikōchū is the evolution of that idea, now transformed into a community-driven, modular, and offensive framework, open to anyone who wants a self-hosted alternative to Shodan, but more offensive and versatile — tailored for real-world fieldwork.

Bikōchū is not just a port scanner. It's a powerful offensive recon engine for security researchers, red teams, and those who think like attackers.

Multi-language offensive framework

  • Rust, Go, Python, Perl, C, and Web tech.
  • Each language chosen based on efficiency and purpose.

Planned Features

🔍 Reconnaissance & Scanning

  • ✅ Mass Internet scanning (IPv4/IPv6), like Shodan/Censys/Zoomeye.
  • ✅ Service fingerprinting (HTTP, SSH, RDP, FTP, SMB, etc.).
  • ✅ Banner grabbing, TLS info, protocol-specific analysis.
  • ✅ GeoIP, ASN, DNS reverse lookups.
  • ✅ Shodan-like searchable database (indexed results for later queries).

⚔️ Vulnerability Research & Exploitation

  • 🚧 Automated exploit attempts for known vulnerabilities (integrating CVE databases and custom exploits).
  • 🚧 Live target vulnerability assessment (e.g., outdated software, default creds, weak protocols).
  • 🚧 Web exploit modules (SQLi, RCE, SSRF, etc.).
  • 🚧 Auto-exploitation module (optional — for controlled attack scenarios).

🕷 Advanced Scraping & Intelligence

  • ✅ OSINT-based target discovery (domain scraping, subdomain enumeration).
  • 🚧 Exploit scraper (auto-download latest PoCs/exploits from GitHub/ExploitDB).
  • 🚧 Dark web scanning (TOR/I2P aware).

⚙️ Framework & Automation

  • ✅ CLI-first, modular design, scriptable for automation.
  • 🚧 Web GUI (in roadmap): visualize scan results, launch exploits.
  • ✅ Multi-threaded and distributed scanning (Rust & Go for speed).
  • ✅ Output export: JSON, CSV, raw text.

🔒 Stealth & Anti-Detection

  • 🚧 Proxy & VPN routing support (SOCKS5, TOR, custom proxies).
  • 🚧 Rate limiting, throttling, and scheduling to avoid bans.
  • 🚧 Evasion tactics (e.g., IP rotation).

⚖️ Legal Disclaimer

Bikochu is a security research and educational tool, created to explore offensive techniques for controlled and authorized environments only.

⚠️ Warning: This tool is provided strictly for research, academic, and legal penetration testing purposes. Do not use Bikochu to scan, exploit, or attack systems you don't own or don't have explicit written authorization to test. Misuse of this tool may lead to criminal prosecution and severe legal consequences. You alone are responsible for any action you take using this tool.

The author declines all responsibility for illegal or unethical use.

🔹 By using Bikochu, you acknowledge that you have read, understood, and agreed to this disclaimer.

(🔼 Back to top)

📚 License

This project is licensed under the GNU Affero General Public License, Version 3.0. For more details, please refer to the LICENSE file in the repository: Read the license on GitHub

(🔼 Back to top)

📞 Contact

ProtonMail LinkedIn Twitter

(🔼 Back to top)

0