All Projects → netevert → Pockint

netevert / Pockint

Licence: mit
A portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️

Programming Languages

python
139335 projects - #7 most used programming language
python3
1442 projects

Projects that are alternatives of or similar to Pockint

Threatpinchlookup
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Stars: ✭ 257 (+31.12%)
Mutual labels:  osint, dfir, incident-response
Thehive4py
Python API Client for TheHive
Stars: ✭ 143 (-27.04%)
Mutual labels:  dfir, incident-response
Mthc
All-in-one bundle of MISP, TheHive and Cortex
Stars: ✭ 134 (-31.63%)
Mutual labels:  dfir, incident-response
Offensive Dockerfiles
Offensive tools as Dockerfiles. Lightweight & Ready to go
Stars: ✭ 150 (-23.47%)
Mutual labels:  osint, infosec
Invoke Liveresponse
Invoke-LiveResponse
Stars: ✭ 115 (-41.33%)
Mutual labels:  dfir, incident-response
Spaces Finder
A tool to hunt for publicly accessible DigitalOcean Spaces
Stars: ✭ 122 (-37.76%)
Mutual labels:  osint, infosec
Intelowl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+978.57%)
Mutual labels:  osint, incident-response
Malice
VirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+539.29%)
Mutual labels:  dfir, infosec
Urlcrazy
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-23.47%)
Mutual labels:  osint, infosec
Karma
Find leaked emails with your passwords
Stars: ✭ 154 (-21.43%)
Mutual labels:  osint, infosec
Thehive
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
Stars: ✭ 2,300 (+1073.47%)
Mutual labels:  dfir, incident-response
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (-42.86%)
Mutual labels:  osint, infosec
Information Security Tasks
This repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-44.9%)
Mutual labels:  osint, incident-response
Chatter
internet monitoring osint telegram bot for windows
Stars: ✭ 123 (-37.24%)
Mutual labels:  osint, infosec
Threathunt
ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
Stars: ✭ 92 (-53.06%)
Mutual labels:  dfir, incident-response
Breach.tw
A service that can track data breaches like "Have I Been Pwned", but it is specific for Taiwan.
Stars: ✭ 144 (-26.53%)
Mutual labels:  osint, infosec
Imago Forensics
Imago is a python tool that extract digital evidences from images.
Stars: ✭ 175 (-10.71%)
Mutual labels:  dfir, incident-response
Mimir
Smart OSINT collection of common IOC types
Stars: ✭ 63 (-67.86%)
Mutual labels:  osint, dfir
Metaforge
An OSINT Metadata analyzing tool that filters through tags and creates reports
Stars: ✭ 63 (-67.86%)
Mutual labels:  osint, infosec
Oriana
Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
Stars: ✭ 152 (-22.45%)
Mutual labels:  dfir, incident-response

Icon

made with python Supported platforms GitHub release GitHub last commit GitHub All Releases Twitter Follow

POCKINT (a.k.a. Pocket Intelligence) is the OSINT swiss army knife for DFIR/OSINT professionals. A lightweight and portable GUI program, it provides users with essential OSINT capabilities in a compact form factor: POCKINT's input box accepts typical indicators (URL, IP, MD5) and gives users the ability to perform basic OSINT data mining tasks in an iterable manner.

demo

Installation

You can grab the latest version from the releases page. POCKINT is provided as a single executable that can be stored and run anywhere on computers. POCKINT is available for Windows only.

Features

Why use it? POCKINT is designed to be simple, portable and powerful.

⭐️ Simple: There's plenty of awesome OSINT tools out there. Trouble is they either require analysts to be reasonably comfortable with the command line (think pOSINT) or give you way too many features (think Maltego). POCKINT focuses on simplicity: INPUT > RUN TRANSFORM > OUTPUT ... rinse and repeat. It's the ideal tool to get results quickly and easily through a simple interface.

📦 Portable: Most tools either require installation, a license or configuration. POCKINT is ready to go whenever and wherever. Put it in your jump kit USB, investigation VM or laptop and it will just run.

🚀 Powerful: POCKINT combines cheap OSINT sources (whois/DNS) with the power of specialised APIs. From the get go you can use a suite of in-built transforms. Add in a couple of API keys and you can unlock even more specialised data mining capabilities.

The latest version is capable of running the following data mining tasks:

Hostnames

Source Transform API key needed?
DNS IP lookup
DNS MX lookup
DNS NS lookup
DNS TXT lookup
WHOIS Domain dnssec status
WHOIS Domain creation
WHOIS Domain expiration
WHOIS Domain emails
WHOIS Domain registrar
WHOIS Registrant location
WHOIS Registrant org
WHOIS Registrant name
WHOIS Registrant address
WHOIS Registrant zipcode
crt.sh Subdomains
Virustotal Downloaded samples ✔️
Virustotal Detected URLs ✔️
Virustotal Subdomains ✔️
OTX Passive DNS ✔️
OTX malicious check ✔️
OTX Malware type ✔️
OTX Malware hash ✔️
OTX Observed urls ✔️
OTX Geolocate ✔️
IP Adresses

Note: Only IPv4 Addresses are supported

Source Transform API key needed?
DNS Reverse lookup
Shodan Ports ✔️
Shodan Geolocate ✔️
Shodan Coordinates ✔️
Shodan CVEs ✔️
Shodan ISP ✔️
Shodan City ✔️
Shodan ASN ✔️
Virustotal Network report ✔️
Virustotal Communicating samples ✔️
Virustotal Downloaded samples ✔️
Virustotal Detected URLs ✔️
OTX Passive DNS ✔️
OTX Malicious check ✔️
OTX Malware type ✔️
OTX Malware hash ✔️
OTX Observed urls ✔️
OTX Geolocate ✔️
Urls

Source Transform API key needed?
DNS Extract hostname
Virustotal Malicious check ✔️
Virustotal Reported detections ✔️
OTX Geolocate ✔️
OTX Parse url ✔️
OTX malicious check ✔️
OTX Http response analysis ✔️
Hashes

Note: Both MD5 and SHA256 hashes are supported

Source Transform API key needed?
Virustotal Malicious check ✔️
Virustotal Malware type ✔️
OTX Malicious check ✔️
Emails

Source Transform API key needed?
N/A Extract domain

New APIs and input integrations are in the works, consult the issues page to check out what's brewing or feel free to propose your own.

Like it?

If you like the tool please consider contributing.

The tool received a few "honourable" mentions, including:

Please note: There have been a small number of reports indicating that pockint triggers false positives on antivirus protected systems (to date Avast, AVG and Norton). The issue seems to be caused by pyinstaller, the python package used to freeze and distribute pockint. If pockint triggers your antivirus please submit an issue and the author will submit a false positive report to the concerned antivirus provider.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].