Skip to content

A next-generation Firewall, CDN & WAF Fingerprinting Framework for Security Researchers, Bug Hunters, and Penetration Testers.

License

Notifications You must be signed in to change notification settings

TEAMBCS/Fire-Eye

Repository files navigation

FIRE-EYE Logo

🔥 FIRE-EYE 🔥

A next-generation Firewall, CDN & WAF Fingerprinting Framework for Security Researchers, Bug Hunters, and Penetration Testers.

Built with ❤️ by BLACK ZERO

🚀 Powered by BANGLADESH CYBER SQUAD and TEAM SHADOW STRIKER
📆 Year: 2025


Over View

FIRE-EYE (fire-eye.py) is a Python3-based advanced security analysis framework that detects and fingerprints Web Application Firewalls (WAFs), CDNs, Load Balancers, and related security layers.

It provides flexible control through user-supplied signatures, regex header matching, and custom request headers — making it suitable for professional pentesters, SOC analysts, and researchers.


Core Features

  • 🔍 WAF / CDN / Load Balancer Detection
  • 🧩 User-Supplied Signature Merging (--user-list, --user-vendors-list)
  • 🔎 Regex Header/Cookie/Body Matching (--header-search)
  • ⚙️ Custom HTTP Headers (--headers)
  • 🧠 Smart User-Agent Rotation (disable with --no-rotate-ua)
  • 📦 Automatic Report Generation (.txt / .md)
  • 💡 Proxy and JSON Output Support

Command-Line Usage

python3 fire-eye.py <target> [options]

Example Options:

Option Description
target Target domain or URL (e.g., https://example.com)
--headers "Key:Val;Key2:Val2" Send custom request headers
--header-search "<regex>" Search for evidence in headers, cookies, or body
--user-list <file> Custom WAF/CDN/token signature list (JSON/simple format)
--user-vendors-list <file> Custom vendor list to merge with default
--proxy <file> File containing proxies (HTTP/SOCKS)
--show-headers Displays raw HTTP headers via curl
--no-rotate-ua Disable User-Agent rotation
--report <path> Save the output report to a custom file
--json Output in JSON format
--debug Enable debug logging

Installation

📲 Termux / Linux

pkg update && pkg install python3 git curl -y
git clone https://github.com/TEAMBCS/Fire-Eye.git
cd Fire-Eye
chmod +x *
pip3 install -r requirements.txt
python3 fire-eye.py -h

After installation, simply run:

python3 fire-eye.py --help

Another Way to install

pip install fire-eye-main
fire-eye -h

JSON Formet Examples

### 1️⃣ **user-list.json**
{
  "MyCustomWAF": {
    "manufacturer": "MyCompany",
    "type": "WAF",
    "headers": ["x-mycompany-id", "mycompany-waf"],
    "cookies": ["MYCOMP_SESSION"],
    "body": ["Access denied by MyCompany WAF"],
    "server": ["mycompany"]
  }
}

2️⃣ user-vendors-list.json

{
  "vendors": [
    "Cloudflare",
    "Akamai",
    "Fastly",
    "AWS CloudFront",
    "Imperva"
  ]
}

🔧 How --headers and --header-search Work

  • --headers Format: "Key:Val;Key2:Val2" Example:

    --headers "User-Agent:Mozilla/5.0;Referer:https://google.com;Accept:*/*"

    ➤ The tool parses and attaches these headers to all requests.

  • --header-search Searches inside headers, cookies, and response body for specific patterns using regex. Example:

    --header-search "(?i)cf-ray|x-amz-cf-id|incap_ses"

    ➤ Matches are displayed and logged in the report.


Usage Examples

1️⃣ Basic Scan

python3 fire-eye.py https://example.com

2️⃣ With Custom Headers and Regex Search

python3 fire-eye.py https://example.com \
  --headers "User-Agent:MyCustomAgent;Referer:https://google.com" \
  --header-search "(?i)cf-ray|x-amz-cf-id|fastly"

3️⃣ With Custom Signature Lists

python3 fire-eye.py https://target.com \
  --user-list user-list.json \
  --user-vendors-list user-vendors-list.json

4️⃣ With Proxy Support

python3 fire-eye.py https://example.com --proxy proxy.txt --debug

5️⃣ JSON Output Mode

python3 fire-eye.py https://example.com --json > result.json

6️⃣ REPORT Save Mode

python3 fire-eye.py https://example.com --report fire-eye.txt

Sample Output pic

pic    

⚙️ Auto Report Save as :

example_com_fireeye_<timestamp>.txt

🧰 Dependencies

Library Purpose
requests HTTP requests
rich Console styling
pyfiglet ASCII banners
colorama Terminal color support

Install manually:

pip install requests rich pyfiglet colorama

⚠️ Disclaimer

This tool is for educational and authorized security testing only. Do not use it against any system or domain without proper permission.

Unauthorized scanning may violate laws or regulations.


👨‍💻 Author


📜 License

MIT License Use responsibly and only for ethical security research.


About

A next-generation Firewall, CDN & WAF Fingerprinting Framework for Security Researchers, Bug Hunters, and Penetration Testers.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages