<div align="center">

<img src="banner.svg" alt="MOTHERFUCKIN TERMINATOR BOT 9000" width="900"/>

**All-in-one offensive OSINT platform — 8 modules, 29+ recon engines, 20+ API integrations, unified SQLite database, one terminal. WordPress pipeline, domain reconnaissance, port scanning, passive intel, and full email recovery.**

> [!CAUTION]
> *Plataforma OSINT ofensiva todo en uno — 8 modulos, 29+ motores de reconocimiento, 20+ integraciones de API, base de datos SQLite unificada, una terminal. Pipeline WordPress, reconocimiento de dominios, escaneo de puertos, inteligencia pasiva y recuperacion completa de emails.*

[![Modules](https://img.shields.io/badge/Modules-8-red)]() [![Language](https://img.shields.io/badge/Go-1.25+-00ADD8?logo=go&logoColor=white)]() [![Recon Engines](https://img.shields.io/badge/Recon_Engines-29+-purple)]() [![APIs](https://img.shields.io/badge/External_APIs-20+-blue)]() [![Names](https://img.shields.io/badge/Names-2,353-orange)]() [![Providers](https://img.shields.io/badge/Providers-772+-yellow)]() [![License](https://img.shields.io/badge/License-Proprietary-red)]()

---

Merges [WordPress Determiner](https://github.com/Ringmast4r/wordpress-determiner), [Hash Hunter](https://github.com/Ringmast4r/Hash-Hunter), [Hash Cracker](https://github.com/Ringmast4r/Hash-Cracker), and [ODINT-Toolkit](https://github.com/Ringmast4r/ODINT-Toolkit) into a single binary with a unified SQLite database. Full WordPress OSINT pipeline, 29+ module domain reconnaissance, port scanning, passive intelligence gathering, and automated email recovery — all from one TUI.

> [!CAUTION]
> *Fusiona [WordPress Determiner](https://github.com/Ringmast4r/wordpress-determiner), [Hash Hunter](https://github.com/Ringmast4r/Hash-Hunter), [Hash Cracker](https://github.com/Ringmast4r/Hash-Cracker) y [ODINT-Toolkit](https://github.com/Ringmast4r/ODINT-Toolkit) en un solo binario con una base de datos SQLite unificada. Pipeline OSINT completo de WordPress, reconocimiento de dominios con 29+ modulos, escaneo de puertos, recoleccion de inteligencia pasiva y recuperacion automatizada de emails — todo desde una sola TUI.*

</div>

---

## Architecture / Arquitectura

```
 MODULE 1                   MODULE 2                   MODULE 3
 WordPress Determiner  -->  Hash Hunter            --> Hash Cracker
 ====================       ====================       ====================
 Detect WordPress sites     Harvest Gravatar hashes    Crack hashes to emails
 10 detection methods       4 collection methods       772+ email providers
 HTTPS/HTTP fallback        REST API + pagination      2,300+ name database
 Bulk with live updates     Sitemap + deep scraping    Multi-CPU parallel
         |                          |                          |
         +------------+-------------+--------------------------+
                      |
               MODULE 4: PIPELINE
               Automated chaining of Modules 1-3
               Cross-module intelligence queries
               Unified export (CSV)
                      |
         +------------+-------------+--------------------------+
         |                          |                          |
 MODULE 5                   MODULE 6                   MODULE 7
 Huntr                      ODINT Toolkit              Port Scanner
 ====================       ====================       ====================
 Domain vuln scanning       29+ recon modules          TCP SYN/connect scan
 Technology fingerprint     20+ external APIs          Top 1000 or custom
 Finding classification     Nmap + CVE enrichment      Service detection
 Bulk domain scanning       Subdomain enumeration      Concurrent workers
                            Secrets/JWT/GraphQL
                            File download + reports
                                    |
                            MODULE 8: SILENT EYE
                            Passive reconnaissance
                            crt.sh, Shodan, VirusTotal
                            IP geolocation, multi-vendor
                                    |
                            UNIFIED DATABASE
                            terminator.db (SQLite WAL)
                            30+ tables, cross-module
                            correlation, single export
```

> [!CAUTION]
> ```
>  MODULO 1                   MODULO 2                   MODULO 3
>  WordPress Determiner  -->  Hash Hunter            --> Hash Cracker
>  ====================       ====================       ====================
>  Detectar sitios WP         Recolectar hashes          Descifrar a emails
>  10 metodos deteccion       4 metodos recoleccion      772+ proveedores
>  Fallback HTTPS/HTTP        REST API + paginacion      2,300+ nombres
>  Masivo con actualizacion   Sitemap + scraping prof    Paralelo multi-CPU
>          |                          |                          |
>          +------------+-------------+--------------------------+
>                       |
>                MODULO 4: PIPELINE
>                Encadenamiento automatico Modulos 1-3
>                Inteligencia entre modulos
>                Exportacion unificada (CSV)
>                       |
>          +------------+-------------+--------------------------+
>          |                          |                          |
>  MODULO 5                   MODULO 6                   MODULO 7
>  Huntr                      ODINT Toolkit              Port Scanner
>  ====================       ====================       ====================
>  Escaneo vuln dominio       29+ modulos de recon       Escaneo TCP SYN/connect
>  Huella tecnologica         20+ APIs externas          Top 1000 o personalizado
>  Clasificacion hallazgos    Nmap + enriquecimiento CVE Deteccion de servicios
>  Escaneo masivo dominios    Enumeracion subdominios    Workers concurrentes
>                             Secretos/JWT/GraphQL
>                             Descarga archivos + reportes
>                                     |
>                             MODULO 8: SILENT EYE
>                             Reconocimiento pasivo
>                             crt.sh, Shodan, VirusTotal
>                             Geolocalizacion IP, multi-vendor
>                                     |
>                             BASE DE DATOS UNIFICADA
>                             terminator.db (SQLite WAL)
>                             30+ tablas, correlacion
>                             entre modulos, exportacion unica
> ```

---

## Module 1 — WordPress Determiner

Detects whether a website runs WordPress using 10 independent detection methods with HTTPS-to-HTTP fallback. Bulk mode updates the target file in real-time, prepending `#` to non-WordPress lines so the file narrows down to confirmed WordPress sites on each run.

> [!CAUTION]
> *Detecta si un sitio web usa WordPress mediante 10 metodos de deteccion independientes con fallback HTTPS a HTTP. El modo masivo actualiza el archivo de destino en tiempo real, anteponiendo `#` a las lineas que no son WordPress para que el archivo se reduzca a sitios WordPress confirmados en cada ejecucion.*

### 10 Detection Methods / 10 Metodos de Deteccion

| # | Endpoint | What It Checks |
|:-:|----------|---------------|
| 1 | `/wp-login.php` | Login page presence |
| 2 | `/wp-json/` | REST API response |
| 3 | Homepage HTML | `wp-content`, `wp-includes`, meta generator |
| 4 | `/xmlrpc.php` | XML-RPC endpoint |
| 5 | `/wp-cron.php` | WP cron handler |
| 6 | `/wp-links-opml.php` | Blogroll OPML export |
| 7 | `/wp-sitemap.xml` | WordPress sitemap |
| 8 | `/feed/` | RSS feed with WP generator tag |
| 9 | `/wp-admin/` | Admin redirect detection |
| 10 | `/wp-includes/` | Directory listing or 403 |

### Commands / Comandos

| Key | Command | Description |
|:---:|---------|-------------|
| 1 | check | Check single URL for WordPress |
| 2 | bulk | Bulk check from .txt file (live file updates) |
| 3 | recheck | Recheck errors & non-WP from DB |
| 4 | clear | Clear output |

---

## Module 2 — Hash Hunter

Aggressive WordPress Gravatar hash OSINT engine. Extracts MD5 email hashes from WordPress sites using 4 collection methods — REST API with full pagination, sitemap parsing, author page scraping, and deep page scraping (homepage + posts + comment feeds). Deduplicates across methods and tracks hash history.

> [!CAUTION]
> *Motor OSINT agresivo de hashes Gravatar de WordPress. Extrae hashes MD5 de email de sitios WordPress usando 4 metodos de recoleccion — REST API con paginacion completa, parseo de sitemaps, scraping de paginas de autor y scraping profundo de paginas (homepage + posts + feeds de comentarios). Deduplica entre metodos y rastrea el historial de hashes.*

### 4 Collection Methods / 4 Metodos de Recoleccion

| Method | How It Works |
|:-------|:------------|
| **REST API** | Full pagination through `/wp-json/wp/v2/users`, 3 endpoint variants, per-page retries |
| **Sitemap** | Parses `wp-sitemap-users-1.xml` and author URLs from sitemap index |
| **Author Scrape** | Scrapes `/author/` pages + common pages (`/team/`, `/about/`, `/staff/`) |
| **Deep Scrape** | Homepage + 20 post pages + comment feeds, 3 regex patterns for hash extraction |

### Commands / Comandos

| Key | Command | Description |
|:---:|---------|-------------|
| 1 | scan | Aggressive scan single target |
| 2 | bulk | Bulk scan from .txt file |
| 3 | rescan | Rescan incomplete sites |
| 4 | stats | Database statistics |
| 5 | export | Export hashes to CSV |
| 6 | history | View hash history |
| 7 | newdb | New database |
| 8 | merge | Merge another .db file |
| 9 | clear | Clear output |
| 0 | resume | Resume interrupted scan |

---

## Module 3 — Hash Cracker

Pattern-based Gravatar email recovery. Takes MD5/SHA256 hashes harvested by Hash Hunter and cracks them back to email addresses by generating thousands of email pattern combinations per hash and testing against 772+ global email providers. Uses a 2,300+ name database to intelligently expand `initial+surname` usernames into full-name email patterns. Multi-CPU parallel workers for maximum speed.

> [!CAUTION]
> *Recuperacion de email de Gravatar basada en patrones. Toma los hashes MD5/SHA256 recolectados por Hash Hunter y los descifra de vuelta a direcciones de correo generando miles de combinaciones de patrones de email por hash y probando contra mas de 772 proveedores de email globales. Usa una base de datos de 2,300+ nombres para expandir inteligentemente usuarios con formato `inicial+apellido` en patrones de email con nombre completo. Workers paralelos multi-CPU para maxima velocidad.*

### Pattern Generation / Generacion de Patrones

11-section pattern engine generating 500-5000+ email candidates per hash:

- Username variants (lowercase, dots, underscores, numbers)
- First name, last name, first+last combinations
- Year suffixes (birth years, current year ranges)
- Common prefixes (`info`, `admin`, `contact`, etc.)
- Nickname mappings (70+ name-to-nickname conversions)
- Role patterns (`webmaster`, `admin`, `editor`)
- International patterns (Spanish, Portuguese, French, German, etc.)
- Leet speak substitutions
- Phonetic and typo variants
- **Name list expansion** — Detects `initial+surname` usernames (e.g. `aacevedo`), expands the initial to all matching first names from a 2,300+ name database, and generates full-name email patterns for each match

### 2,300+ First Name Database / 2,300+ Nombres de Pila

Loaded from `src/names/firstnames.txt` on startup. Organized by region:

| Region | Coverage |
|:-------|:---------|
| **Venezuela** | 500+ names including creative Venezuelan naming patterns |
| **Colombia** | Yeison, Duvan, Stiven, Karol, and Colombian-specific names |
| **Brazil** | 300+ names — Thiago, Guilherme, Caio, Enzo, Heitor, etc. |
| **Peru / Ecuador / Bolivia** | Andean-specific names |
| **Argentina / Chile / Uruguay** | Southern Cone names (Facundo, Nahuel, Macarena, etc.) |
| **Iran / Persia** | 220+ names — Mohammad, Reza, Fatemeh, Zahra, etc. |
| **China** | 200+ romanized/pinyin names — Wei, Jianhua, Mei, Ying, etc. |
| **Arab / Middle East** | 220+ names — Lebanese/Syrian diaspora in Latin America |
| **Caribbean** | Trinidad, Guyana, Suriname names |
| **Portugal / Cape Verde** | Portuguese-specific names |

> [!CAUTION]
> *Cargados desde `src/names/firstnames.txt` al iniciar. 2,300+ nombres organizados por region: Venezuela, Colombia, Brasil, Peru, Argentina, Iran, China, Medio Oriente, Caribe, y Portugal.*

### 772+ Email Providers / 772+ Proveedores de Email

Organized by region: Major Global (Gmail, Outlook, Yahoo, ProtonMail), Microsoft, Yahoo, Google, Apple, USA ISPs, UK, Germany, France, Spain, Italy, Netherlands, Belgium, Nordics, Eastern Europe, Latin America, Asia, Middle East, Africa, Australia, Canada, Privacy providers, Legacy, Educational, and Tech companies.

### Commands / Comandos

| Key | Command | Description |
|:---:|---------|-------------|
| 1 | load-db | Load hashes from external .db file |
| 2 | load-internal | Load from internal hashes table |
| 3 | load-wordlist | Load custom wordlist |
| 4 | start | Start cracking (parallel workers) |
| 5 | view | View cracked hashes |
| 6 | export | Export results to CSV |
| 7 | stats | Database statistics |
| 8 | clear | Clear output |

---

## Module 4 — Pipeline

Automated chaining of all three WordPress modules with cross-module intelligence. Run the full pipeline from a domain list and get emails out the other end — no manual switching between modules.

> [!CAUTION]
> *Encadenamiento automatico de los tres modulos WordPress con inteligencia entre modulos. Ejecuta el pipeline completo desde una lista de dominios y obtiene emails al otro extremo — sin cambiar manualmente entre modulos.*

### Pipeline Modes / Modos de Pipeline

| Mode | What It Does |
|:-----|:------------|
| **Full** | Detect WP -> Harvest hashes -> Crack emails (end-to-end) |
| **Detect-Harvest** | Detect WP sites -> Harvest hashes from confirmed sites |
| **Harvest-Crack** | Harvest from unscanned WP sites in DB -> Crack uncracked hashes |

### Cross-Module Intelligence / Inteligencia Entre Modulos

- **WP sites not scanned** — Confirmed WordPress sites that Hash Hunter hasn't visited yet
- **Uncracked hashes** — Hashes in the DB that Hash Cracker hasn't cracked yet
- **Full intel report** — Combined stats across all modules with actionable recommendations

### Commands / Comandos

| Key | Command | Description |
|:---:|---------|-------------|
| 1 | full | Full pipeline: Detect -> Harvest -> Crack |
| 2 | detect-harvest | Detect WP -> Harvest hashes |
| 3 | harvest-crack | Harvest -> Crack (uses DB data) |
| 4 | targets | Cross-module intelligence report |
| 5 | export-all | Unified CSV export (all modules) |
| 6 | clear | Clear output |

---

## Module 5 — Huntr

Domain vulnerability scanner with technology fingerprinting and finding classification. Scans single domains or bulk lists, detecting server technologies, frameworks, and security issues. Stores findings with severity ratings in the unified database.

> [!CAUTION]
> *Escaner de vulnerabilidades de dominios con huella tecnologica y clasificacion de hallazgos. Escanea dominios individuales o listas masivas, detectando tecnologias de servidor, frameworks y problemas de seguridad. Almacena hallazgos con clasificacion de severidad en la base de datos unificada.*

### Commands / Comandos

| Key | Command | Description |
|:---:|---------|-------------|
| 1 | scan | Scan single domain |
| 2 | bulk | Bulk scan from file |
| 3 | stats | Database statistics |
| 4 | export | Export findings (CSV) |
| 5 | clear | Clear output |

---

## Module 6 — ODINT Toolkit

Full-spectrum domain reconnaissance framework with **29+ recon modules** and **20+ external API integrations**. Ported from the standalone [ODINT-Toolkit v4.0.0](https://github.com/Ringmast4r/ODINT-Toolkit) into the unified TERMINATOR BOT platform. Runs a complete OSINT pipeline against any domain — from DNS and SSL analysis to nmap port scanning, CVE enrichment, subdomain enumeration, secrets detection, and deep content analysis.

> [!CAUTION]
> *Framework de reconocimiento de dominios de espectro completo con **29+ modulos de recon** y **20+ integraciones de API externas**. Portado desde el [ODINT-Toolkit v4.0.0](https://github.com/Ringmast4r/ODINT-Toolkit) independiente a la plataforma unificada TERMINATOR BOT. Ejecuta un pipeline OSINT completo contra cualquier dominio — desde analisis DNS y SSL hasta escaneo de puertos nmap, enriquecimiento CVE, enumeracion de subdominios, deteccion de secretos y analisis profundo de contenido.*

### 29+ Recon Modules / 29+ Modulos de Reconocimiento

| Category | Modules |
|:---------|:--------|
| **DNS** | 13 record types — A, AAAA, MX, NS, TXT, CNAME, PTR, SPF, DMARC, SOA, SRV, CAA, DKIM |
| **SSL/TLS** | Cert chain, TLS 1.0-1.3 enumeration, cipher suites, OCSP, PFS, ALPN, HSTS preload |
| **HTTP** | Security headers, CORS analysis, cookie flags, redirect chains, HTTP version |
| **Technology** | 185+ fingerprints across 12 categories with confidence scoring |
| **Content** | Meta tags, forms, Schema.org/JSON-LD, analytics IDs, hreflang, canonical, RSS/Atom feeds |
| **Nmap** | Service scan (top 1000 ports) with automatic CVE enrichment via NIST NVD API v2.0 |
| **Subdomains** | crt.sh Certificate Transparency + SecurityTrails API + pattern-based DNS brute |
| **Paths** | 60+ exposed path checks (`.git`, `.env`, backups, debug, cloud creds, CI/CD, API docs) |
| **WordPress** | Version, theme, plugin detection, user enumeration, REST API namespace discovery |
| **Secrets** | 18+ regex patterns — AWS keys, Stripe keys, GitHub tokens, JWTs, database URIs, private keys |
| **JWT** | Token discovery in cookies/headers/HTML/JS, base64URL decode, claim extraction |
| **GraphQL** | Endpoint probing (6 common paths) + introspection query for schema enumeration |
| **JavaScript** | Global variables, config objects, environment leaks, debug/feature flags |
| **CSP** | Content-Security-Policy directive parsing, unsafe-inline/eval detection |
| **Email Security** | SPF, DMARC, DKIM, MTA-STS, BIMI, SMTP TLS Reporting |
| **Virtual Hosts** | Reverse IP lookup for shared hosting enumeration |
| **Error Pages** | Server fingerprinting, stack trace detection, internal IP/path leaks |
| **Page Intel** | Iframes, webhooks, reporting endpoints, structured data, file discovery |
| **WHOIS** | Registrar, dates, name servers, registrant info |
| **Wayback** | Historical snapshots via CDX API |
| **File Download** | Batch download with SHA256 chain of custody and `sourcelist.txt` audit trail |
| **Reports** | Full HTML and JSON report generation per domain |

### 20+ External API Integrations / 20+ Integraciones de API Externas

| API | What It Does |
|:----|:------------|
| **Shodan** | Internet-wide port/service/vulnerability data |
| **HIBP** | Have I Been Pwned breach lookups per email |
| **GitHub** | Code search, repo discovery, gist scanning, user OSINT |
| **Censys** | Host and certificate search |
| **VirusTotal** | Domain reputation and subdomain discovery |
| **SecurityTrails** | Historical DNS, subdomain enumeration, WHOIS history |
| **Hunter.io** | Email pattern discovery and verification |
| **GreyNoise** | IP noise/threat classification |
| **BinaryEdge** | Internet scan data and host intelligence |
| **ZoomEye** | Cyberspace search engine |
| **FOFA** | Network asset search |
| **IPInfo** | IP geolocation and ASN data |
| **BGPView** | BGP routing and ASN lookup (free) |
| **DeHashed** | Breach database search |
| **LeakCheck** | Credential leak detection |
| **Snusbase** | Data breach search |
| **IntelX** | Intelligence X archive search |
| **Google Dorks** | Auto-generated dork queries (no API needed) |
| **Social Media** | Profile detection across 10+ platforms |
| **Cloud Storage** | S3, Azure Blob, GCS bucket exposure checks |
| **Network Intel** | ASN, BGP prefix, ISP, geolocation via ip-api.com (free) |

### Commands / Comandos

| Key | Command | Description |
|:---:|---------|-------------|
| 1 | recon | Full recon on target (29+ modules) |
| 2 | bulk | Bulk recon from file |
| 3 | dns | DNS enumeration (13 types) |
| 4 | ssl | SSL/TLS deep analysis |
| 5 | tech | Technology fingerprint (185+) |
| 6 | lookup | WHOIS/Wayback/CVE lookup |
| 7 | nmap | Nmap service scan + CVE |
| 8 | subs | Subdomain enumeration |
| 9 | paths | Exposed path detection |
| A | download | Download discovered files |
| B | report | Generate HTML/JSON report |
| C | config | Configure API keys (20+) |
| D | stats | Database statistics |
| E | export | Export results (CSV) |

---

## Module 7 — Port Scanner

TCP port scanner with service detection. Scans the top 1000 ports or custom ranges with concurrent workers. Identifies open ports and running services, storing results in the unified database.

> [!CAUTION]
> *Escaner de puertos TCP con deteccion de servicios. Escanea los top 1000 puertos o rangos personalizados con workers concurrentes. Identifica puertos abiertos y servicios en ejecucion, almacenando resultados en la base de datos unificada.*

### Commands / Comandos

| Key | Command | Description |
|:---:|---------|-------------|
| 1 | scan | Scan target (top 1000) |
| 2 | custom | Custom port range |
| 3 | bulk | Bulk scan from file |
| 4 | stats | Database statistics |
| 5 | export | Export results (CSV) |
| 6 | clear | Clear output |

---

## Module 8 — Silent Eye

Passive reconnaissance engine that queries multiple external vendors without touching the target directly. Aggregates data from Certificate Transparency logs, Shodan, VirusTotal, and IP geolocation services to build an intel profile without leaving a fingerprint.

> [!CAUTION]
> *Motor de reconocimiento pasivo que consulta multiples proveedores externos sin tocar directamente al objetivo. Agrega datos de logs de Certificate Transparency, Shodan, VirusTotal y servicios de geolocalizacion IP para construir un perfil de inteligencia sin dejar huella.*

### Commands / Comandos

| Key | Command | Description |
|:---:|---------|-------------|
| 1 | recon | Full passive recon (all vendors) |
| 2 | crtsh | Certificate Transparency (free) |
| 3 | shodan | Shodan lookup |
| 4 | vt | VirusTotal subdomains |
| 5 | ipinfo | IP geolocation (free) |
| 6 | config | Configure API keys |
| 7 | stats | Database statistics |
| 8 | export | Export results (CSV) |
| 9 | clear | Clear output |

---

## Unified Database / Base de Datos Unificada

All 8 modules feed a single `terminator.db` with WAL mode. Targets flow automatically between modules — WordPress sites detected in Module 1 become scan targets in Module 2, and harvested hashes flow into Module 3 for cracking. The ODINT module alone uses 30+ tables for its 29+ recon engines.

> [!CAUTION]
> *Los 8 modulos alimentan una sola `terminator.db` con modo WAL. Los objetivos fluyen automaticamente entre modulos — los sitios WordPress detectados en el Modulo 1 se convierten en objetivos de escaneo en el Modulo 2, y los hashes recolectados fluyen al Modulo 3 para descifrado. El modulo ODINT solo usa 30+ tablas para sus 29+ motores de reconocimiento.*

### Schema / Esquema

```
=== WordPress Pipeline (Modules 1-4) ===
targets          — Shared target registry (domain, WP status, hash count, cracked count)
sites            — WordPress Determiner results (10-method detection, status codes)
domains          — Hash Hunter scan records (status, hash count per domain)
hashes           — Gravatar hashes (domain, hash, username, hash_type, source)
hash_history     — Hash discovery audit trail
scan_sessions    — Bulk scan session tracking
session_targets  — Per-target status within sessions
cracked          — Cracked email results (hash -> email mapping)

=== ODINT Toolkit (Module 6) — 30+ tables ===
odint_scans              — Scan session records
odint_dns                — DNS records (13 types)
odint_ssl                — SSL certificates and TLS analysis
odint_technologies       — Technology fingerprints (185+)
odint_findings           — Security findings with severity
odint_whois              — WHOIS registration data
odint_wayback            — Wayback Machine snapshots
odint_nmap_results       — Nmap port/service scan results
odint_cve_findings       — CVE vulnerabilities (NVD API)
odint_wordpress_sites    — WordPress detection results
odint_wordpress_users    — WordPress user enumeration
odint_subdomains         — Subdomain enumeration results
odint_exposed_paths      — Exposed path detection
odint_jwt_tokens         — JWT token analysis
odint_graphql_endpoints  — GraphQL endpoint discovery
odint_secrets            — Detected secrets and credentials
odint_historical_records — Historical data
odint_hash_correlations  — Hash correlation tracking
odint_error_pages        — Error page fingerprints
odint_cookie_fingerprints — Cookie analysis
odint_management_uis     — Management interface detection
odint_analytics_ids      — Analytics/tracking IDs
odint_csp_directives     — CSP policy analysis
odint_iframe_sources     — Iframe source tracking
odint_virtual_hosts      — Virtual host enumeration
odint_email_security     — Email security DNS (SPF/DMARC/DKIM/MTA-STS/BIMI)
odint_reporting_endpoints — Reporting endpoint detection
odint_webhook_urls       — Webhook URL discovery
odint_structured_data    — Schema.org/JSON-LD data
odint_discovered_files   — File discovery inventory
odint_social_profiles    — Social media profile detection
odint_cloud_exposures    — Cloud storage exposure checks
odint_github_findings    — GitHub OSINT results
odint_google_dorks       — Generated Google dork queries
odint_network_intel      — Network/ASN/BGP intelligence
odint_hibp_breaches      — HIBP breach data
```

---

## Usage / Uso

```bash
# Launch with module selector (splash screen)
./terminator.exe

# Jump directly to a module
./terminator.exe -m wp          # WordPress Determiner
./terminator.exe -m hunter      # Hash Hunter
./terminator.exe -m cracker     # Hash Cracker
./terminator.exe -m pipeline    # Pipeline
./terminator.exe -m huntr       # Huntr
./terminator.exe -m odint       # ODINT Toolkit
./terminator.exe -m portscan    # Port Scanner
./terminator.exe -m silenteye   # Silent Eye

# Options
./terminator.exe -w 200         # Set worker count
./terminator.exe -t 15          # Set timeout (seconds)
./terminator.exe -db path.db    # Custom database path
```

### Navigation / Navegacion

| Key | Action |
|:----|:-------|
| **Tab** | Open module selector |
| **1-8** | Jump to module directly |
| **Arrow keys** | Navigate menu |
| **Enter** | Select command |
| **F1** | Settings (workers, timeout) |
| **ESC** | Cancel running scan / go back |
| **PgUp/PgDn** | Scroll output |

---

## Component Origins / Origen de los Componentes

| Module | Original Tool | GitHub |
|:-------|:-------------|:-------|
| WordPress Determiner | wordpress-determiner | [`Ringmast4r/wordpress-determiner`](https://github.com/Ringmast4r/wordpress-determiner) |
| Hash Hunter | Hash-Hunter | [`Ringmast4r/Hash-Hunter`](https://github.com/Ringmast4r/Hash-Hunter) |
| Hash Cracker | Hash-Cracker | [`Ringmast4r/Hash-Cracker`](https://github.com/Ringmast4r/Hash-Cracker) |
| ODINT Toolkit | ODINT-Toolkit | [`Ringmast4r/ODINT-Toolkit`](https://github.com/Ringmast4r/ODINT-Toolkit) |

> Part of the [Recon Suite](https://github.com/Ringmast4r) — OSINT and reconnaissance tools.

> [!CAUTION]
> *Parte del [Recon Suite](https://github.com/Ringmast4r) — herramientas de OSINT y reconocimiento.*

---

## Tech Stack / Stack Tecnologico

| | |
|:--|:--|
| **Language** | Go 1.25+ |
| **TUI** | tcell/v2 |
| **Database** | SQLite via modernc.org/sqlite (pure Go, no CGO) |
| **Architecture** | Multi-file modules (`main.go` + 4 module files, ~13,000+ lines total) |
| **Concurrency** | Goroutine worker pools, multi-CPU hash cracking, parallel recon pipelines |
| **Theme** | Pure red terminator gradient with per-module accent colors |

---

## Build / Compilar

```bash
cd src/
go build -o ../terminator.exe .

# Linux
GOOS=linux GOARCH=amd64 go build -o ../terminator .
```

---

<div align="center">

**[Ringmast4r](https://github.com/Ringmast4r)**

Proprietary. All rights reserved. / *Propietario. Todos los derechos reservados.*

</div>
