⚔️ CrimsonWare CLI - Documentation

Version: CW-DEV-2026.V1 | Theme: Dark Crimson

Comprehensive guide to the CrimsonWare Security Intelligence Framework.

crimsonware@security:~
$ sudo python3 crimsonware.py
╔══════════════════════════════════════════════════════════════╗
║ ⚔️ CRIMSONWARE v1.0 ⚔️ ║
║ ║
║ ██████╗██████╗ ██╗ ║
║ ██╔════╝██╔══██╗██║ ║
║ ██║ ██████╔╝██║ ║
║ ██║ ██╔══██╗██║ ║
║ ╚██████╗██║ ██║██║ ║
║ ╚═════╝╚═╝ ╚═╝╚═╝ ║
║ ║
╚══════════════════════════════════════════════════════════════╝
[✓] Authentication successful - HWID verified
[✓] 61+ modules loaded
[+] OSINT • Recon • Exploitation • Forensics • Analysis
CrimsonWare> _

📖 Overview

CrimsonWare is a powerful, modular command-line interface (CLI) for security intelligence, penetration testing, digital forensics, and cyber analysis. It features a full-width, dark crimson-themed interface and is designed for professionals and security researchers.

🔑 Key Authentication System
CrimsonWare uses a hardware ID (HWID)-based licensing system. The tool verifies your license key against a remote server on startup.

⚙️ Installation & Setup

Ensure you have Python 3.8+ and the required dependencies installed.

1. Clone the Repository & Install Dependencies

# Install required packages
pip install rich colorama pyfiglet requests flask

2. Directory Structure

Your CrimsonWare directory should be organized like this:


CrimsonWare/
├── crimsonware.py          # Main launcher script
├── modules/                 # All tool modules
│   ├── osint/
│   │   ├── username_tracker.py
│   │   ├── email_lookup.py
│   │   └── ...
│   ├── recon/
│   ├── exploit/
│   ├── forensics/
│   └── analysis/
└── utils/
    └── crimson_logger.py   # Logging utility
  

3. Running CrimsonWare

Run the script with administrator/root privileges for full functionality.

# On Windows (Run as Administrator)
python crimsonware.py

# On Linux/macOS
sudo python3 crimsonware.py

The script will automatically request elevation if not run as admin.

🔐 Authentication System

On first run, CrimsonWare will prompt you for a license key. The key is verified with a remote server. Upon success, your HWID is saved locally (~/.crimsonware_auth). The license is checked on every startup.

crimsonware@security:~
$ python crimsonware.py
==================================================
🔒 CRIMSONWARE LICENSE REQUIRED
==================================================
Please enter your license key:
(Keys can be obtained from the Discord server)
License Key: CR1M50N-XXXXX-XXXXX-XXXXX
🔑 Verifying key...
✅ Authentication successful!
📅 Key expires: 2027-12-31 23:59:59
Press Enter to continue...

⚠️ Important

Without a valid license key, the application will not start.

🖥️ User Interface & Navigation

The interface is built with the rich library and adapts to your terminal size. It features a full-width banner, color-coded menus, and a persistent command bar.

crimsonware@security:~
╔══════════════════════════════════════════════════════════════╗
║ MAIN MENU ║
╠══════════════════════════════════════════════════════════════╣
1🔍 OSINT Tools │ Open Source Intelligence
2🌐 Reconnaissance │ Target reconnaissance
3⚔️ Exploitation │ Exploitation frameworks
4🔬 Forensics │ Digital forensics
5📊 Cyber Analysis │ Data analysis & visualization
0🚪 Exit │ Exit CrimsonWare
╚══════════════════════════════════════════════════════════════╝
Available commands: help clear exit logs
CrimsonWare> _

Main Menu Categories

Global Commands

These commands are available from any menu:

help
Show help
clear
Clear screen
exit/quit
Exit tool
logs
View recent logs

📦 Complete Module Reference (61 BASIC Modules)

Below is the complete list of all 61 modules available in the BASIC plan. To run a module, navigate to its category menu and enter its corresponding number.

crimsonware@security:~
CrimsonWare> 1
╔══════════════════════════════════════════════════════════════╗
║ 🔍 OSINT TOOLS ║
╠══════════════════════════════════════════════════════════════╣
1Username Tracker │ Ready
2Email Lookup │ Ready
3Phone Lookup │ Ready
0Back to Main Menu │ Return
╚══════════════════════════════════════════════════════════════╝
OSINT> 1
[*] Initializing Username Tracker...
.
..
...
[✓] Module loaded successfully

🔍 OSINT (12 Modules) BASIC

Username Tracker

Search usernames across 100+ platforms.

Email Lookup

Find accounts and data linked to an email.

Phone Lookup

Carrier, location, and reputation from a phone number.

Image EXIF

Extract metadata (GPS, camera) from images.

IP Lookup

Geolocation, ISP, and threat intelligence.

Domain OSINT

Comprehensive domain investigation.

Google Dorking

Advanced search operators for sensitive data.

Metadata Extractor

Extract hidden data from documents.

Breach Checker

Check if credentials appear in known breaches.

Public Records

Search government and public databases.

Reverse Image Search

Find where an image appears online.

Dark Web Scanner

Monitor dark web for compromised data.

🌐 Reconnaissance (9 Modules) BASIC

Port Scanner

Fast TCP/UDP port scanning.

Service Scanner

Identify running services and versions.

Network Mapper

Discover hosts and network topology.

WHOIS Lookup

Domain registration and ownership details.

DNS Analyzer

DNS enumeration and record analysis.

Subdomain Finder

Discover subdomains via brute force and APIs.

SSL Analyzer

Check SSL/TLS certificates and cipher suites.

Traceroute

Map network path to a target.

Tech Stack Detection

Identify website technologies and CMS.

⚔️ Exploitation (9 Modules) BASIC

Password Auditor

Test password strength.

Exploit Finder

Search for exploits based on CVEs.

Payload Generator

Generate custom payloads.

Buffer Overflow

Buffer overflow detection.

Password Cracker

Dictionary and brute-force cracking.

Reverse Engineering

Basic binary analysis tools.

Privilege Escalation

Enumeration and PE exploits.

RAT Maker

Create custom Remote Access Trojans.

Virus Creator

Generate proof-of-concept viruses.

🔬 Forensics (16 Modules) BASIC

Memory Forensics

Analyze memory dumps.

File Carving

Recover deleted files.

Disk Analysis

Disk and partition inspection.

Registry Analyzer

Windows registry forensics.

Log Analyzer

Parse and analyze system logs.

Timeline Generator

Create activity timelines.

Artifact Collector

Collect forensic artifacts.

Web Scraper

Extract web content forensically.

Malware Triage

Basic malware behavior analysis.

Browser Forensics

Extract browser history and data.

Email Forensics

Analyze email headers and content.

Network Forensics

PCAP analysis and reconstruction.

...and 4 more

Additional forensic utilities.

🛡️ Cyber Analysis (15 Modules) BASIC

ML Classifier

Basic malware classification.

Network Defender

Monitor and block suspicious traffic.

Packet Sniffer

Capture and dissect network traffic.

WiFi Analyzer

Scan and analyze wireless networks.

Malware Scanner

Signature-based file scanning.

System Info

Detailed system enumeration.

Hash Identifier

Identify hash types.

Dox Tracker

Monitor for PII exposure.

Threat Intel Feeds

Integrate and query IOCs.

RAT Detector

Detect RAT activity.

Keylogger Detector

Detect keylogging.

IDS/IPS Integration

Connect to detection systems.

Honeypot Manager

Deploy and monitor honeypots.

Web App Scanner

Scan web apps for vulns.

Threat Hunter

Proactive threat hunting.

▶️ Running a Module

When you select a module, CrimsonWare loads it and attempts to execute its .run() function. The interface provides loading animations and error handling.

crimsonware@security:~
Recon> 1
[*] Initializing Port Scanner...
.
..
...
[✓] Module loaded successfully
╔══════════════════════════════════════════════════════════════╗
║ PORT SCANNER v2.0 ║
╚══════════════════════════════════════════════════════════════╝
Target IP: 192.168.1.1
Port range: 1-1000
Scanning 192.168.1.1...
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
443/tcp open https
Press Enter to return to menu...

📋 Logging System

The CrimsonLogger utility tracks all significant actions. You can view recent logs from within the tool using the logs command. Logs are stored in a structured format with timestamps, categories, and statuses.

crimsonware@security:~
CrimsonWare> logs
═══════════════════════════════════════════════════════════════
RECENT LOG ENTRIES
═══════════════════════════════════════════════════════════════
[2024-05-20 14:35:22] [OSINT] [SUCCESS] Username lookup completed for 'johndoe'
[2024-05-20 14:36:45] [RECON] [SUCCESS] Port scan completed for 192.168.1.1
[2024-05-20 14:38:12] [SYSTEM] [INFO] Session started - User: admin
[2024-05-20 14:42:33] [FORENSICS] [WARNING] Memory dump analysis incomplete
═══════════════════════════════════════════════════════════════

⭐ Premium Plan (Coming Soon)

Future Premium modules will unlock advanced capabilities:

crimsonware@security:~
CrimsonWare> exit
╔══════════════════════════════════════════════════════════════╗
║ SHUTTING DOWN ║
╚══════════════════════════════════════════════════════════════╝
Session ended - Runtime: 364.2s - Commands: 24
Goodbye.

✅ Legal & Responsible Use

All CrimsonWare tools are intended for educational purposes, authorized security assessments, and professional research. Users are solely responsible for complying with all applicable local, state, and federal laws. Misuse of these tools may lead to severe legal penalties.

← Back to Wiki 🌐 Visit Crimson Site