All Projects → ninoseki → Mitaka

ninoseki / Mitaka

Licence: mit
A browser extension for OSINT search

Programming Languages

typescript
32286 projects

Projects that are alternatives of or similar to Mitaka

censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-94%)
Mutual labels:  osint, threat-intelligence
DaProfiler
DaProfiler allows you to create a profile on your target based in France only. The particularity of this program is its ability to find the e-mail addresses your target.
Stars: ✭ 58 (-87.99%)
Mutual labels:  osint, threat-intelligence
Scrummage
The Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (-26.5%)
Mutual labels:  osint, threat-intelligence
Osweep
Don't Just Search OSINT. Sweep It.
Stars: ✭ 225 (-53.42%)
Mutual labels:  osint, threat-intelligence
Dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+546.79%)
Mutual labels:  osint, threat-intelligence
Mihari
A helper to run OSINT queries & manage results continuously
Stars: ✭ 239 (-50.52%)
Mutual labels:  osint, threat-intelligence
ayashige
Ayashige provides a list of suspicious newly updated domains as a JSON feed
Stars: ✭ 27 (-94.41%)
Mutual labels:  osint, threat-intelligence
Intelowl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+337.68%)
Mutual labels:  osint, threat-intelligence
Threatpinchlookup
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Stars: ✭ 257 (-46.79%)
Mutual labels:  osint, chrome-extension
Stalkphish
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (-47%)
Mutual labels:  osint, threat-intelligence
Misp Modules
Modules for expansion services, import and export in MISP
Stars: ✭ 198 (-59.01%)
Mutual labels:  osint, threat-intelligence
Singlefile
Web Extension for Firefox/Chrome/MS Edge and CLI tool to save a faithful copy of an entire web page in a single HTML file
Stars: ✭ 4,417 (+814.49%)
Mutual labels:  osint, chrome-extension
Misp Training
MISP trainings, threat intel and information sharing training materials with source code
Stars: ✭ 185 (-61.7%)
Mutual labels:  osint, threat-intelligence
Omnibus
The OSINT Omnibus (beta release)
Stars: ✭ 243 (-49.69%)
Mutual labels:  osint, threat-intelligence
Opensquat
Detection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (-69.15%)
Mutual labels:  osint, threat-intelligence
OSINT-Brazuca
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Stars: ✭ 508 (+5.18%)
Mutual labels:  osint, threat-intelligence
Chatter
internet monitoring osint telegram bot for windows
Stars: ✭ 123 (-74.53%)
Mutual labels:  osint, threat-intelligence
Opencti
Authors
Stars: ✭ 2,165 (+348.24%)
Mutual labels:  osint, threat-intelligence
misp-osint-collection
Collection of best practices to add OSINT into MISP and/or MISP communities
Stars: ✭ 54 (-88.82%)
Mutual labels:  osint, threat-intelligence
Python Iocextract
Defanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (-37.89%)
Mutual labels:  osint, threat-intelligence

Mitaka

Build Status CodeFactor Coverage Status

eyecatch

Mitaka is a browser extension for OSINT (open source intelligence) search which can:

  • Extract & refang IoCs (indicators of compromise) from a selected block of text.
    • E.g. example[.]com to example.com, test[at]example.com to [email protected], hxxp://example.com to http://example.com, etc.
    • You can find all the refang techniques in here.
  • Search / scan it on various engines.
    • E.g. VirusTotal, urlscan.io, Censys, Shodan, etc.

Install

Features

Supported IoCs

Name Desc. E.g.
asn ASN AS13335
btc BTC address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa
cve CVE number CVE-2018-11776
domain Domain name github.com
email Email address [email protected]
eth Ethereum address 0x32be343b94f860124dc4fee278fdcbd38c102d88
gaPubID Google Adsense Publisher ID pub-9383614236930773
gaTrackID Google Analytics Tracker ID UA-67609351-1
hash MD5, SHA1, SHA256 44d88612fea8a8f36de82e1278abb02f
ip IPv4 address 8.8.8.8
url URL https://github.com

Supported search engines

Name URL Supported types
AbuseIPDB https://www.abuseipdb.com IP
AnyRun https://app.any.run Hash
apklab https://apklab.io Hash (SHA256)
archive.org https://archive.org URL
archive.today http://archive.fo URL
BGPView https://bgpview.io IP, ASN
BinaryEdge https://app.binaryedge.io IP, domain
BitcoinAbuse https://www.bitcoinabuse.com BTC
BitcoinWhosWhos https://bitcoinwhoswho.com BTC
Blockchain.com https://www.blockchain.com BTC
Blockchair https://blockchair.com BTC, ETH
BlockCypher https://live.blockcypher.com BTC
Censys https://censys.io IP, domain, ASN
Checkphish https://checkphish.ai IP, domain
crt.sh https://crt.sh Domain
DNSlytics https://dnslytics.com IP, domain
DomainBigData https://domainbigdata.com IP, domain, email
DomainTools https://www.domaintools.com IP, domain
DomainWatch https://domainwat.ch Domain, email
EmailRep https://emailrep.io Email
FOFA https://fofa.so IP, domain
FortiGuard https://fortiguard.com IP, URL, CVE
Google Safe Browsing https://transparencyreport.google.com Domain, URL
GreyNoise https://viz.greynoise.io IP, domain, ASN, CVE
Hashdd https://hashdd.com Hash
Hurricane Electric https://bgp.he.net/ IP, domain, ASN
HybridAnalysis https://www.hybrid-analysis.com IP, domain, hash
Intelligence X https://intelx.io IP, domain, URL, email, BTC
Intezer https://analyze.intezer.com Hash
IPinfo https://ipinfo.io IP, ASN
IPIP https://en.ipip.net IP, ASN
Joe Sandbox https://www.joesandbox.com Hash
MalShare https://malshare.com Hash
Maltiverse https://www.maltiverse.com Domain, hash
MalwareBazaar https://bazaar.abuse.ch Hash
Malwares https://www.malwares.com Hash
NVD https://nvd.nist.gov CVE
OOCPR https://data.occrp.org Email
ONYPHE https://www.onyphe.io IP
OpenTIP https://opentip.kaspersky.com Hash
OTX https://otx.alienvault.com IP, domain hash
Pulsedive https://pulsedive.com IP, domain, URL, hash
Radar https://radar.cloudflare.com IP, domain
RiskIQ http://community.riskiq.com IP, domain, email, Google Analytics Tracker ID
Robtex https://www.robtex.com IP, domain
Scumware https://www.scumware.org IP, domain, hash (MD5)
SecurityTrails https://securitytrails.com IP, domain, email
Shodan https://www.shodan.io IP, domain, ASN
Sploitus https://sploitus.com CVE
SpyOnWeb http://spyonweb.com IP, domain, Google Adsense Publisher ID, Google Analytics Tracker ID
Spyse https://spyse.com IP, domain, ASN
Talos https://talosintelligence.com IP, domain
ThreatConnect https://app.threatconnect.com IP, domain, email
ThreatCrowd https://www.threatcrowd.org IP, domain, email
ThreatMiner https://www.threatminer.org IP, domain, hash
TIP https://threatintelligenceplatform.com IP, domain
Triage https://tria.ge Hash, URL
URLhaus https://urlhaus.abuse.ch IP, domain
Urlscan https://urlscan.io IP, domain, ASN, URL
ViewDNS https://viewdns.info IP, domain, email
VirusTotal https://www.virustotal.com IP, domain, URL, hash
VMRay https://www.vmray.com Hash
Vulmon https://vulmon.com CVE
VulncodeDB https://www.vulncode-db.com CVE
VxCube http://vxcube.com IP, domain, hash
WebAnalyzer https://wa-com.com Domain
X-Force Exchange https://exchange.xforce.ibmcloud.com IP, domain, hash
ZoomEye https://www.zoomeye.org IP

Supported scan engines

name url supported types
Browserling https://www.browserling.com URL
HybridAnalysis https://www.hybrid-analysis.com URL
Urlscan https://urlscan.io IP, domain, URL
VirusTotal https://www.virustotal.com URL

How to use

This browser extension shows context menus based on a type of IoC you select and then you can choose what you want to search / scan on.

Examples:

"example"

"example2"

Also, there is a how-to article about Mitaka by Null Byte.

Note:

Please set your API keys in the options for enabling HybridAnalysis, urlscan.io and VirusTotal scans.

Options

You can enable / disable a search engine on the options page based on your preference.

"options.png

About Permissons

This browser extension requires the following permissions.

  • Read and change all your data on the websites you visit:
    • This extension creates context menus dynamically based on what you select on a website.
    • It means this extension requires reading all your data on the websites you visit. (This extension doesn't change anything on the websites)
  • Display notifications:
    • This extension makes a notification when something goes wrong.

I don't (and will never) collect any information from the users.

Privacy Policy

Common Questions

  • Q. The context menu is not showing.
    • A. Sometimes it takes time to show the context menu in Chrome. Please wait for a second after selecting. Then the context menu will show.

Alternatives or Similar Tools

Contribute

Read the contribution guide and join the contributors.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].