⚔️ CrimsonWare CLI - Documentation
Version: CW-DEV-2026.V1 | Theme: Dark Crimson
Comprehensive guide to the CrimsonWare Security Intelligence Framework.
📖 Overview
CrimsonWare is a powerful, modular command-line interface (CLI) for security intelligence, penetration testing, digital forensics, and cyber analysis. It features a full-width, dark crimson-themed interface and is designed for professionals and security researchers.
⚙️ Installation & Setup
Ensure you have Python 3.8+ and the required dependencies installed.
1. Clone the Repository & Install Dependencies
pip install rich colorama pyfiglet requests flask
2. Directory Structure
Your CrimsonWare directory should be organized like this:
CrimsonWare/
├── crimsonware.py # Main launcher script
├── modules/ # All tool modules
│ ├── osint/
│ │ ├── username_tracker.py
│ │ ├── email_lookup.py
│ │ └── ...
│ ├── recon/
│ ├── exploit/
│ ├── forensics/
│ └── analysis/
└── utils/
└── crimson_logger.py # Logging utility
3. Running CrimsonWare
Run the script with administrator/root privileges for full functionality.
python crimsonware.py
# On Linux/macOS
sudo python3 crimsonware.py
The script will automatically request elevation if not run as admin.
🔐 Authentication System
On first run, CrimsonWare will prompt you for a license key. The key is verified with a remote server. Upon success, your HWID is saved locally (~/.crimsonware_auth). The license is checked on every startup.
⚠️ Important
Without a valid license key, the application will not start.
🖥️ User Interface & Navigation
The interface is built with the rich library and adapts to your terminal size.
It features a full-width banner, color-coded menus, and a persistent command bar.
Main Menu Categories
- 1. OSINT Tools - Open Source Intelligence gathering
- 2. Reconnaissance - Target reconnaissance and mapping
- 3. Exploitation - Exploitation frameworks and tools
- 4. Forensics - Digital forensics and analysis
- 5. Cyber Analysis - Data analysis and visualization
- 0. Exit - Exit CrimsonWare
Global Commands
These commands are available from any menu:
helpclearexit/quitlogs📦 Complete Module Reference (61 BASIC Modules)
Below is the complete list of all 61 modules available in the BASIC plan. To run a module, navigate to its category menu and enter its corresponding number.
🔍 OSINT (12 Modules) BASIC
Username Tracker
Search usernames across 100+ platforms.
Email Lookup
Find accounts and data linked to an email.
Phone Lookup
Carrier, location, and reputation from a phone number.
Image EXIF
Extract metadata (GPS, camera) from images.
IP Lookup
Geolocation, ISP, and threat intelligence.
Domain OSINT
Comprehensive domain investigation.
Google Dorking
Advanced search operators for sensitive data.
Metadata Extractor
Extract hidden data from documents.
Breach Checker
Check if credentials appear in known breaches.
Public Records
Search government and public databases.
Reverse Image Search
Find where an image appears online.
Dark Web Scanner
Monitor dark web for compromised data.
🌐 Reconnaissance (9 Modules) BASIC
Port Scanner
Fast TCP/UDP port scanning.
Service Scanner
Identify running services and versions.
Network Mapper
Discover hosts and network topology.
WHOIS Lookup
Domain registration and ownership details.
DNS Analyzer
DNS enumeration and record analysis.
Subdomain Finder
Discover subdomains via brute force and APIs.
SSL Analyzer
Check SSL/TLS certificates and cipher suites.
Traceroute
Map network path to a target.
Tech Stack Detection
Identify website technologies and CMS.
⚔️ Exploitation (9 Modules) BASIC
Password Auditor
Test password strength.
Exploit Finder
Search for exploits based on CVEs.
Payload Generator
Generate custom payloads.
Buffer Overflow
Buffer overflow detection.
Password Cracker
Dictionary and brute-force cracking.
Reverse Engineering
Basic binary analysis tools.
Privilege Escalation
Enumeration and PE exploits.
RAT Maker
Create custom Remote Access Trojans.
Virus Creator
Generate proof-of-concept viruses.
🔬 Forensics (16 Modules) BASIC
Memory Forensics
Analyze memory dumps.
File Carving
Recover deleted files.
Disk Analysis
Disk and partition inspection.
Registry Analyzer
Windows registry forensics.
Log Analyzer
Parse and analyze system logs.
Timeline Generator
Create activity timelines.
Artifact Collector
Collect forensic artifacts.
Web Scraper
Extract web content forensically.
Malware Triage
Basic malware behavior analysis.
Browser Forensics
Extract browser history and data.
Email Forensics
Analyze email headers and content.
Network Forensics
PCAP analysis and reconstruction.
...and 4 more
Additional forensic utilities.
🛡️ Cyber Analysis (15 Modules) BASIC
ML Classifier
Basic malware classification.
Network Defender
Monitor and block suspicious traffic.
Packet Sniffer
Capture and dissect network traffic.
WiFi Analyzer
Scan and analyze wireless networks.
Malware Scanner
Signature-based file scanning.
System Info
Detailed system enumeration.
Hash Identifier
Identify hash types.
Dox Tracker
Monitor for PII exposure.
Threat Intel Feeds
Integrate and query IOCs.
RAT Detector
Detect RAT activity.
Keylogger Detector
Detect keylogging.
IDS/IPS Integration
Connect to detection systems.
Honeypot Manager
Deploy and monitor honeypots.
Web App Scanner
Scan web apps for vulns.
Threat Hunter
Proactive threat hunting.
▶️ Running a Module
When you select a module, CrimsonWare loads it and attempts to execute its .run() function. The interface provides loading animations and error handling.
📋 Logging System
The CrimsonLogger utility tracks all significant actions. You can view recent logs from within the tool using the logs command.
Logs are stored in a structured format with timestamps, categories, and statuses.
⭐ Premium Plan (Coming Soon)
Future Premium modules will unlock advanced capabilities:
- AI-Powered Analysis - Automated threat scoring and pattern recognition.
- Zero-Day Exploit Detection - Heuristic-based exploit detection.
- Enterprise Forensics Suite - Advanced disk imaging and live memory analysis.
- Automated Reporting - Generate professional PDF and HTML reports.
- API Integrations - Connect with SIEMs and other security tools.
✅ Legal & Responsible Use
All CrimsonWare tools are intended for educational purposes, authorized security assessments, and professional research. Users are solely responsible for complying with all applicable local, state, and federal laws. Misuse of these tools may lead to severe legal penalties.