A powerful and comprehensive Telegram bot designed for cybersecurity reconnaissance and network analysis. TalonStrike provides a wide range of tools for security professionals, researchers, and enthusiasts to perform various reconnaissance tasks directly through Telegram.
- Network Scanning - Nmap integration for port scanning and service detection
- DNS Lookup - Domain name resolution and reverse DNS queries
- WHOIS Lookup - Domain registration and ownership information
- Header Analysis - HTTP header inspection and security analysis
- Phone Number Lookup - Telecommunications information gathering
- OSINT Tools - Open-source intelligence gathering capabilities
- AI Integration - Interactive AI assistant for guidance and automation
- Multi-threading Support - Concurrent bot and web services
- Flask Web Interface - Additional web-based scanning endpoints
- Command Management - Dynamic command registration and help system
- Secure Token Management - Protected API key storage and configuration
- Interactive CLI - User-friendly command-line interface for setup and management
- Python 3.7 or higher
- Telegram Bot Token (from @BotFather)
- GitHub Token (optional, for enhanced features)
-
Clone the repository:
git clone https://github.com/your-username/TalonStrike.git cd TalonStrike -
Install required dependencies:
pip install -r requirements.txt
-
Set up your environment:
python main.py
- Message @BotFather on Telegram
- Create a new bot with
/newbot - Save your bot token securely
- Use the TalonStrike CLI to configure your tokens
python main.py/start- Initialize the bot and display welcome message/commands- List all available commands/nmap <target>- Perform network scanning/dnslookup <domain>- DNS resolution/reversedns <ip>- Reverse DNS lookup/whoislookup <domain>- WHOIS information/analyzeheader <url>- HTTP header analysis/phone <number>- Phone number information/doxing <target>- OSINT information gathering/startai- Activate AI assistant mode/stopai- Deactivate AI assistant/help- Display help information
- This tool is intended for educational purposes and authorized security testing only
- Users are responsible for complying with all applicable laws and regulations
- Always obtain proper authorization before scanning or testing systems you do not own
- Misuse of this tool may violate local, state, national, or international laws
- The developers assume no liability for misuse or damages caused by this software
Contributions are welcome! Please feel free to submit a Pull Request. For major changes, please open an issue first to discuss what you would like to change.
This project is licensed under the MIT License - see the LICENSE file for details.
This project is built using several excellent open-source libraries and tools:
-
python-nmap - Nmap integration
- License: GPL-3.0
- Enables network scanning capabilities
-
python-whois - WHOIS lookup functionality
- License: MIT
- Provides domain registration information
-
Requests - HTTP library
- License: Apache-2.0
- Handles HTTP requests for various features
- Nmap - Network discovery and security auditing
- License: GPL-2.0
- The underlying scanning engine (requires separate installation)
If you encounter any issues or have questions:
- Check the Issues page
- Create a new issue if your problem isn't already reported
- Provide detailed information about your environment and the issue
Made with ❤️