Click to collapse/expand
Bikōchū (微香虫) is a DIY offensive Shodan-like scanner, fully self-hosted, designed for deep Internet-wide reconnaissance, vulnerability hunting, and exploitation.
Inspired by the "scent bug" from Naruto, Bikōchū's mission is simple: sniff out what others don't see — exposed services, weak configurations, vulnerabilities, and exploitation vectors — on a massive scale.
Unlike traditional scanners, Bikōchū is built for offensive capabilities, combining exploits, vulnerability scraping, OSINT, and large-scale reconnaissance into a modular, multi-language framework.
Bikōchū was originally inspired by a Military Interest Intelligence project (RIM — Renseignement d'Intérêt Militaire), developed with colleagues and focused on reconnaissance, large-scale data aggregation, and military target analysis.
During that time, I developed an initial minimalist tool, far from perfect but adapted to our specific operational needs.
⚙️ Bikōchū is the evolution of that idea, now transformed into a community-driven, modular, and offensive framework, open to anyone who wants a self-hosted alternative to Shodan, but more offensive and versatile — tailored for real-world fieldwork.
Bikōchū is not just a port scanner. It's a powerful offensive recon engine for security researchers, red teams, and those who think like attackers.
- Rust, Go, Python, Perl, C, and Web tech.
- Each language chosen based on efficiency and purpose.
- ✅ Mass Internet scanning (IPv4/IPv6), like Shodan/Censys/Zoomeye.
- ✅ Service fingerprinting (HTTP, SSH, RDP, FTP, SMB, etc.).
- ✅ Banner grabbing, TLS info, protocol-specific analysis.
- ✅ GeoIP, ASN, DNS reverse lookups.
- ✅ Shodan-like searchable database (indexed results for later queries).
- 🚧 Automated exploit attempts for known vulnerabilities (integrating CVE databases and custom exploits).
- 🚧 Live target vulnerability assessment (e.g., outdated software, default creds, weak protocols).
- 🚧 Web exploit modules (SQLi, RCE, SSRF, etc.).
- 🚧 Auto-exploitation module (optional — for controlled attack scenarios).
- ✅ OSINT-based target discovery (domain scraping, subdomain enumeration).
- 🚧 Exploit scraper (auto-download latest PoCs/exploits from GitHub/ExploitDB).
- 🚧 Dark web scanning (TOR/I2P aware).
- ✅ CLI-first, modular design, scriptable for automation.
- 🚧 Web GUI (in roadmap): visualize scan results, launch exploits.
- ✅ Multi-threaded and distributed scanning (Rust & Go for speed).
- ✅ Output export: JSON, CSV, raw text.
- 🚧 Proxy & VPN routing support (SOCKS5, TOR, custom proxies).
- 🚧 Rate limiting, throttling, and scheduling to avoid bans.
- 🚧 Evasion tactics (e.g., IP rotation).
Bikochu
is a security research and educational tool, created to explore offensive techniques for controlled and authorized environments only.
⚠️ Warning: This tool is provided strictly for research, academic, and legal penetration testing purposes. Do not use Bikochu to scan, exploit, or attack systems you don't own or don't have explicit written authorization to test. Misuse of this tool may lead to criminal prosecution and severe legal consequences. You alone are responsible for any action you take using this tool.
The author declines all responsibility for illegal or unethical use.
🔹 By using Bikochu, you acknowledge that you have read, understood, and agreed to this disclaimer.
This project is licensed under the GNU Affero General Public License, Version 3.0. For more details, please refer to the LICENSE file in the repository: Read the license on GitHub