SHADOWMAP

Pure Python OSINT & Target Intelligence Engine
Before you attack, you see everything. Zero footprint. Pure intelligence.
8
Modules
930
Tests
624
Subdomain Signatures
47+
Framework Fingerprints
pip install red-specter-shadowmap
Docs
DNS ENUMERATION | SUBDOMAIN DISCOVERY | WHOIS INTELLIGENCE | ASN MAPPING | EMPLOYEE PROFILING | EMAIL HARVESTING | BREACH CORRELATION | TECH STACK FINGERPRINTING | CDN DETECTION | WAF IDENTIFICATION | CVE MAPPING DNS ENUMERATION | SUBDOMAIN DISCOVERY | WHOIS INTELLIGENCE | ASN MAPPING | EMPLOYEE PROFILING | EMAIL HARVESTING | BREACH CORRELATION | TECH STACK FINGERPRINTING | CDN DETECTION | WAF IDENTIFICATION | CVE MAPPING

Blind Operators Attack Blind. SHADOWMAP Sees First.

Every red team engagement starts with reconnaissance. Most teams cobble together a dozen browser tabs, three SaaS tools, and a spreadsheet. SHADOWMAP replaces all of it. Pure Python. One command. Complete target intelligence before a single packet touches the wire.

Fragmented Recon

DNS lookup here, WHOIS there, Shodan in another tab, LinkedIn in a browser. Ten tools, ten formats, zero correlation. You spend more time copying data between tools than analysing it.

Noisy Collection

Most OSINT tools actively probe targets. DNS brute force, port scans, direct requests. The target sees you before you see them. Passive reconnaissance should leave zero footprint. Most tools don't understand the difference.

No Attack Surface Map

You have subdomains in one list, email patterns in another, tech stacks in a third. Nothing connects. Nothing correlates. A subdomain running a vulnerable CMS with a known email pattern is a high-value target. Your tools don't know that.

Manual Enrichment

Every finding needs manual enrichment. Found a subdomain? Manually check what it runs. Found an email? Manually check breach databases. Hours of manual work per target. SHADOWMAP does it in seconds.

The SHADOWMAP Intelligence Suite

Eight modules. Each one built from scratch in pure Python. No external API dependencies. No SaaS wrappers. Every DNS resolver, every WHOIS parser, every fingerprinting engine written natively. 930 tests. 624 subdomain signatures. Complete target intelligence.

Module 01

DOMAIN

DNS & Domain Intelligence

DNS enumeration, subdomain brute force with 624 signatures, WHOIS parsing across 80+ servers, zone transfer detection. Complete domain surface mapping from a single seed domain.

Module 02

NETWORK

Infrastructure Mapping

ASN mapping, hosting provider identification across 50+ providers, CDN detection with 18 signatures, IP geolocation. Maps the physical and logical infrastructure behind every target.

Module 03

COMPANY

Corporate Intelligence

Company structure analysis, subsidiary mapping, key employee identification, public filing extraction. Builds the organisational graph that social engineering campaigns target.

Module 04

PEOPLE

Personnel Profiling

Individual profiling, role mapping within target organisations, departure tracking for insider threat assessment. Identifies high-value targets for spear phishing and social engineering.

Module 05

EMAIL

15 Email Patterns

Email pattern discovery across 15 common formats, validation via SPF/DKIM/DMARC analysis, breach correlation for credential exposure assessment. Builds verified contact lists from zero.

Module 06

SOCIAL

Platform Footprint

Social media platform discovery, technology mentions in posts and profiles, conference talks, open-source contributions. Maps the digital footprint that reveals internal technology decisions.

Module 07

BREACH

Credential Exposure

Breach data correlation, credential exposure assessment, password pattern analysis, domain-wide breach impact scoring. Quantifies how exposed the target's credentials already are.

Module 08

TECH

47+ Frameworks • 20+ CMS • 30 WAFs

Technology stack fingerprinting across 47+ frameworks, 20+ CMS platforms, 30 WAF signatures. CVE mapping from discovered versions. Knows what they're running before you touch it.

One Command. Complete Target Profile.

Map the entire attack surface from a single domain:

$ shadowmap scan --target target.com --full
[DOMAIN] Enumerating DNS records...
  47 subdomains discovered12 A records, 8 CNAME, 3 MX, 2 TXT
[NETWORK] Mapping infrastructure...
  ASN: AS13335 (Cloudflare)CDN detected: Cloudflare
  3 hosting providers — AWS, DigitalOcean, Cloudflare
[COMPANY] Analysing corporate structure...
  4 subsidiaries identified23 key personnel mapped
[EMAIL] Discovering email patterns...
  Pattern: firstname.lastname@target.com
  SPF: pass | DMARC: none | DKIM: valid
[BREACH] Correlating breach data...
  847 credentials exposed across 6 breaches
[TECH] Fingerprinting technology stack...
  React 18.2, nginx 1.24, Node.js3 CVEs mapped
[SOCIAL] Mapping social footprint...
  LinkedIn, GitHub, Twitter12 tech mentions found

SCAN COMPLETE | 47 subdomains | 847 exposed creds | 3 CVEs | JSON + HTML reports generated

Passive by Default

Standard mode is fully passive. Zero footprint on the target. No DNS brute force, no SMTP validation, no active probes. Just intelligence gathered from public sources.

Correlated Intelligence

Subdomains link to tech stacks. Tech stacks link to CVEs. Emails link to breaches. Every finding enriches every other finding. One unified intelligence picture.

WRAITH Integration

SHADOWMAP builds the target profile. WRAITH scans what SHADOWMAP found. Subdomains become scan targets. Tech stacks become vulnerability vectors. Intelligence drives exploitation.

NEMESIS Integration

Target intelligence feeds directly into NEMESIS. The Supreme Commander uses SHADOWMAP intelligence to select weapons, plan attack chains, and prioritise targets automatically.

8
Modules
930
Tests
624
Subdomain Signatures
80+
WHOIS Servers
Unleashed Mode

Standard Mode Observes. UNLEASHED Mode Interrogates.

Standard mode is passive only. Zero footprint. UNLEASHED mode enables active DNS brute force, SMTP validation, subdomain enumeration at scale, and direct target interaction. Ed25519 key gate required. Two flags must be passed. This is not accidental.

Capability Standard Unleashed
DNS enumeration Public records only Active brute force, zone transfers
Subdomain discovery Passive sources 624-word brute force + permutations
Email validation Pattern detection only SMTP validation, deliverability check
Breach correlation Domain-level summary Individual credential exposure
Tech fingerprinting Header analysis Active probing, deep fingerprinting
Company intelligence Public filings Extended profiling, departure tracking
Target footprint Zero — fully passive Active — target will see probes

Ed25519 Gate

UNLEASHED mode requires an Ed25519 private key at ~/.redspecter/override_private.pem and the --override --confirm-destroy flags. Without both, SHADOWMAP operates in passive mode — gathering intelligence from public sources with zero target footprint. The gate is cryptographic. There is no bypass. One key. One operator. Founder's machine only.

Intelligence Drives Everything

SHADOWMAP is the first link in the kill chain. Every tool downstream uses SHADOWMAP intelligence. Subdomains become WRAITH scan targets. Email patterns become SPECTER SOCIAL phishing vectors. Tech stacks become vulnerability surfaces. Breach data becomes credential attacks. One reconnaissance run powers the entire engagement.

SHADOWMAP Builds the Profile

Stage 1 — Target Intelligence

SHADOWMAP maps the entire attack surface. Domains, subdomains, infrastructure, people, emails, technology, breaches. Complete intelligence picture from a single domain seed.

WRAITH Scans the Surface

Stage 2 — Infrastructure Testing

WRAITH takes SHADOWMAP's subdomain list and scans every one. Port scanning, service fingerprinting, web vulnerability testing, CVE mapping. Intelligence becomes vulnerability data.

REAPER Exploits

Stage 3 — Exploitation

REAPER uses WRAITH's vulnerability data and SHADOWMAP's technology fingerprints to select and deliver exploits. The right exploit for the right target, informed by intelligence.

GHOUL Cracks Credentials

Stage 4 — Credential Attack

GHOUL uses SHADOWMAP's breach data and email patterns to build targeted credential attacks. Known password patterns from breaches inform cracking strategies.

DOMINION Owns the Domain

Stage 5 — Domain Dominance

DOMINION uses SHADOWMAP's corporate structure and GHOUL's cracked credentials to attack Active Directory. Organisational intelligence drives privilege escalation paths.

Pure Engineering
Zero External APIs. Zero SaaS Dependencies.

Most OSINT tools are API wrappers around Shodan, Censys, and VirusTotal. SHADOWMAP is actual engineering. Every DNS resolver, every WHOIS parser, every fingerprinting engine written from scratch in pure Python. No API keys. No rate limits. No monthly subscriptions. No dependencies that can revoke access, change pricing, or disappear.

8
Modules
624
Subdomain Signatures
930
Tests
80+
WHOIS Servers

Eighteen Tools. Every Layer. No Gaps.

SHADOWMAP is Tool 17 in the Red Specter offensive pipeline. It builds the target intelligence profile that every other tool consumes. Before you attack, you see everything.

Tool 1 — LLM
FORGE
Test the model
Tool 2 — Agent
ARSENAL
Test the AI agent
Tool 3 — Swarm
PHANTOM
Coordinated agent assault
Tool 4 — Web
POLTERGEIST
Test the web layer
Tool 5 — Traffic
GLASS
Watch the wire
Tool 6 — Adversarial
NEMESIS
Think like the attacker
Tool 7 — Human
SPECTER SOCIAL
Target the human
Tool 8 — OS/Kernel
PHANTOM KILL
Own the foundation
Tool 9 — Physical
GOLEM
Attack the physical layer
Tool 10 — Supply Chain
HYDRA
Attack the trust chain
Tool 11 — Operator
SCREAMER
Blind the operator
Tool 12 — Infrastructure
WRAITH
The ghost in the wire
Tool 13 — Exploitation
REAPER
Deliver the payload
Tool 14 — Credentials
GHOUL
Crack the credentials
Tool 15 — Wireless
SPECTRE
Own the airwaves
Tool 16 — Active Directory
DOMINION
Own the domain
Tool 17 — OSINT
SHADOWMAP
See everything first
Tool 18 — Browser
BANSHEE
Own the browser
Discovery & Governance
IDRIS
Discovery & governance
Defence Layer
AI SHIELD
Defend everything above
SIEM Integration
redspecter-siem
Enterprise SIEM correlation

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
Tsurugi
.deb package
PyPI
pip install
Docker
docker-compose

Before You Attack, See Everything.

SHADOWMAP maps the entire attack surface before a single packet touches the wire. Pure Python. Zero footprint. Complete target intelligence.