Byakugan is a dark-themed, AI-augmented recon framework for ethical hackers and bug bounty hunters. Inspired by the all-seeing dojutsu, it automates subdomain discovery, live host detection, visual intelligence, and threat analysis using real-world tools (subfinder, httpx, gowitness) combined with AI models like Gemini and GPT.
With a CLI-first workflow and optional FastAPI + Tailwind dashboard, Byakugan gives you a hacker’s all-seeing eye — spotlighting high-risk targets, suggesting exploits, and tagging bounty-worthy domains instantly.
Prashant Kumar Garg
Check their projects out: Cafe DJ Discord Bot, ExtinguishX, Portfolio Website
Once you ship this you can't edit the description of the project, but you'll be able to add more devlogs and re-ship it as you add new features!
DevLog #1 – Launching Byakugan
Today, I officially began building Byakugan, my dark-themed, AI-assisted recon tool made for bug bounty hunters and cybersecurity enthusiasts like myself.
The core idea is to automate recon workflows — subdomain enumeration, probing for live hosts, capturing screenshots, and using AI to instantly analyze risk, suggest potential exploits, and even tag domains for bounty potential. Imagine having a hacker’s sixth sense — that’s what I’m aiming for.
Here’s what I accomplished today:
• Built the CLI core in Python
• Integrated subfinder for subdomain discovery
• Used httpx to detect live hosts
• Wired in gowitness for screenshot automation
• Designed a clean output structure for storing results
• Connected the Gemini API for AI-generated recon summaries
I faced some annoying bugs like Kali’s pip install restrictions, gowitness misusage, and Gemini API rate limits, but I worked around them all — including setting up a proper virtual environment and caching outputs to continue from previous scans.
This is just Phase 1. Up next is adding more tools (like Amass, crt.sh), improving scan persistence, introducing multi-AI fallback (Grok > GPT > Gemini), and working on an optional FastAPI + Tailwind dashboard.
Byakugan is more than a tool — it's going to be the hacker’s all-seeing eye. Stay tuned.
— Lav (aka kairav | KafeStack)