ORION

AI-Native Reconnaissance Engine

Nmap tells you what's open. ORION tells you what's possible.

9
Subsystems
8
OSINT Sources
4
Stealth Levels
210
Tests
View Documentation GitHub

Beyond Port Scanning

ORION doesn't just find open ports. It discovers hosts, fingerprints services, maps DNS, pulls OSINT from 8 sources, reasons about what it finds with an LLM, generates attack plans, anonymises everything through 4 stealth levels, and renders the entire attack surface as a graph.

01

SENTINEL

HOST DISCOVERY

ARP, ICMP, TCP SYN, UDP probes. Identifies live hosts across subnets, cloud ranges, and segmented networks. Adaptive timing to avoid detection.

02

SCOPE

PORT SCANNING

SYN, connect, UDP, FIN, XMAS, NULL, and idle scans. Service version detection. Top ports or full 65535. Rate-limited and stealth-aware.

03

SIGNAL

FINGERPRINTING

OS detection, service banners, TLS certificate analysis, application-layer probes. Identifies technology stacks, frameworks, and known vulnerable versions.

04

ECHO

DNS INTELLIGENCE

Forward/reverse lookups, zone transfers, subdomain enumeration, DNS record analysis. Maps the full DNS footprint including cloud endpoints and CDN origins.

05

GHOST

8 OSINT SOURCES

Shodan, Censys, VirusTotal, SecurityTrails, crt.sh, WHOIS, BGP, and passive DNS. Correlates external intelligence with active scan results.

06

HUNTER

LLM REASONING

Feeds all reconnaissance data into an LLM reasoning engine. Identifies attack paths, misconfigurations, and exposure patterns that scanners miss.

07

PATHFINDER

ATTACK PLANS

Generates prioritised attack plans from HUNTER's analysis. Maps services to known exploits, ranks by impact and feasibility, outputs actionable playbooks.

08

VOID

4 STEALTH LEVELS

Anonymity engine. Level 1: direct. Level 2: proxy chains. Level 3: Tor routing. Level 4: distributed multi-hop with timing randomisation. All subsystems route through VOID.

09

CONSTELLATION

ATTACK SURFACE GRAPH

Renders the full attack surface as an interactive graph. Hosts, ports, services, vulnerabilities, OSINT, and attack paths — all connected and explorable.

UNLEASHED Gate

Cryptographic override. Private key controlled. One operator. Founder's machine only.

Standard

Passive reconnaissance only. OSINT, DNS, certificate transparency. No packets sent to target. No detection risk.

Dry Run

Simulates active scanning. Shows what would be discovered and what traffic would be generated. Ed25519 required. No execution.

Live

Active stealth reconnaissance. Full scanning through VOID anonymity. All 9 subsystems engaged. Real traffic to target.

THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS SIGNED AND LOGGED.

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
PyPI
pip install
Docker
docker-compose
9
Subsystems
210
Tests
25
Tools in Suite
47,573
Ecosystem Tests

Nmap Was 1997. ORION Is Now.

9 subsystems. 8 OSINT sources. 4 stealth levels. LLM reasoning. Attack surface graphs. Reconnaissance evolved.