🚨 Shai-Hulud Strikes Again:834 Packages Compromised.Technical Analysis
Socket
Book a DemoInstallSign in
Socket

fire-eye-BCS

Package Overview
Dependencies
Maintainers
0
Versions
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

fire-eye-BCS

A powerful tool by BANGLADESH CYBER SQUAD

pipPyPI
Version
2.3
Maintainers
0

FIRE-EYE Logo

🔥 FIRE-EYE 🔥

A next-generation Firewall, CDN & WAF Fingerprinting Framework for Security Researchers, Bug Hunters, and Penetration Testers.

Built with ❤️ by BLACK ZERO

🚀 Powered by BANGLADESH CYBER SQUAD and TEAM SHADOW STRIKER
📆 Year: 2025

---

Over View

FIRE-EYE (fire-eye.py) is a Python3-based advanced security analysis framework that detects and fingerprints Web Application Firewalls (WAFs), CDNs, Load Balancers, and related security layers.

It provides flexible control through user-supplied signatures, regex header matching, and custom request headers — making it suitable for professional pentesters, SOC analysts, and researchers.

Core Features

  • 🔍 WAF / CDN / Load Balancer Detection
  • 🧩 User-Supplied Signature Merging (--user-list, --user-vendors-list)
  • 🔎 Regex Header/Cookie/Body Matching (--header-search)
  • ⚙️ Custom HTTP Headers (--headers)
  • 🧠 Smart User-Agent Rotation (disable with --no-rotate-ua)
  • 📦 Automatic Report Generation (.txt / .md)
  • 💡 Proxy and JSON Output Support

Command-Line Usage

python3 fire-eye.py <target> [options]

Example Options:

OptionDescription
targetTarget domain or URL (e.g., https://example.com)
--headers "Key:Val;Key2:Val2"Send custom request headers
--header-search "<regex>"Search for evidence in headers, cookies, or body
--user-list <file>Custom WAF/CDN/token signature list (JSON/simple format)
--user-vendors-list <file>Custom vendor list to merge with default
--proxy <file>File containing proxies (HTTP/SOCKS)
--show-headersDisplays raw HTTP headers via curl
--no-rotate-uaDisable User-Agent rotation
--report <path>Save the output report to a custom file
--jsonOutput in JSON format
--debugEnable debug logging

Installation

📲 Termux / Linux

pkg update && pkg install python3 git curl -y
git clone https://github.com/TEAMBCS/Fire-Eye.git
cd Fire-Eye
chmod +x *
pip3 install -r requirements.txt
python3 fire-eye.py -h

After installation, simply run:

python3 fire-eye.py --help

JSON Formet Examples

### 1️⃣ **user-list.json**
{
  "MyCustomWAF": {
    "manufacturer": "MyCompany",
    "type": "WAF",
    "headers": ["x-mycompany-id", "mycompany-waf"],
    "cookies": ["MYCOMP_SESSION"],
    "body": ["Access denied by MyCompany WAF"],
    "server": ["mycompany"]
  }
}

2️⃣ user-vendors-list.json

{
  "vendors": [
    "Cloudflare",
    "Akamai",
    "Fastly",
    "AWS CloudFront",
    "Imperva"
  ]
}

🔧 How --headers and --header-search Work

  • --headers Format: "Key:Val;Key2:Val2" Example:

    --headers "User-Agent:Mozilla/5.0;Referer:https://google.com;Accept:*/*"
    

    ➤ The tool parses and attaches these headers to all requests.

  • --header-search Searches inside headers, cookies, and response body for specific patterns using regex. Example:

    --header-search "(?i)cf-ray|x-amz-cf-id|incap_ses"
    

    ➤ Matches are displayed and logged in the report.

Usage Examples

1️⃣ Basic Scan

python3 fire-eye.py https://example.com
python3 fire-eye.py https://example.com \
  --headers "User-Agent:MyCustomAgent;Referer:https://google.com" \
  --header-search "(?i)cf-ray|x-amz-cf-id|fastly"

3️⃣ With Custom Signature Lists

python3 fire-eye.py https://target.com \
  --user-list user-list.json \
  --user-vendors-list user-vendors-list.json

4️⃣ With Proxy Support

python3 fire-eye.py https://example.com --proxy proxy.txt --debug

5️⃣ JSON Output Mode

python3 fire-eye.py https://example.com --json > result.json

6️⃣ REPORT Save Mode

python3 fire-eye.py https://example.com --report fire-eye.txt

Sample Output pic

pic    

⚙️ Auto Report Save as :

example_com_fireeye_<timestamp>.txt

🧰 Dependencies

LibraryPurpose
requestsHTTP requests
richConsole styling
pyfigletASCII banners
coloramaTerminal color support

Install manually:

pip install requests rich pyfiglet colorama

⚠️ Disclaimer

This tool is for educational and authorized security testing only. Do not use it against any system or domain without proper permission.

Unauthorized scanning may violate laws or regulations.

👨‍💻 Author

  • Adi Barua (ADIRTTA)BLACK ZERO
  • 🌐 GitHub: github.com/TEAM-BCS
  • 📱 Facebook: facebook.com/BANGLADESH-CYBER-SQUAD
  • ⚡ Team: TEAM BCS

📜 License

MIT License Use responsibly and only for ethical security research.

FAQs

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts