A tool to search Aviation-related intelligence from public sources. AVOSINT is a cutting-edge tool designed to extract and analyze aviation-related intelligence from public sources.
It utilizes powerful OSINT techniques to monitor aircraft movements, gather historical data, and retrieve detailed aircraft information.
This article explores how AVOSINT can be deployed and its various capabilities in aviation intelligence gathering.
docker run -p 3001:3001 axarev/parsr
./avosint.py [--action ACTION] [--tail-number TAIL-NUMBER] [--icao ICAO]
With ACTION being either ICAO
, tail
, convert
, monitor
tail
– Gather infos starting from tail number. Option --tail-number
is required.
convert
– Convert USA hex to ICAO. Option --icao
is required.
monitor
– Gathers positionnal information from osint sources and detects hovering patterns. Requires --icao
number
Returns the following informations when possible:
The following display is then presented:
Current Status: [Done]
Last action: tail
Current tail: {tail_n}
==========================================
✈️ Aircraft infos:
Manufacturer: {}
Manufacturer Serial Number: {}
Tail Number: {}
Call Sign: {}
Last known position: {}
Last known altitude: {}
???? Owner infos
Name: {}
Street: {}
City: {}
ZIP: {}
Country: {}
New Action [ICAO, tail, convert, monitor, exit, quit] (None):
pip install -r requirements.txt
This tool also uses the OpenSkyApi available. Install it using:
git clone https://github.com/openskynetwork/opensky-api
pip install -e /path/to/repository/python
docker run -p 3001:3001 axarev/parsr
As some registers are in the form of a pdf file, AVOSINT uses parsr Due to a bug in the current version of the parsr library (axa-group/Parsr#565 (comment)) it is necessary to apply the following fix in the parsr-client
python library:
return {
- 'file': file,
- 'config': config,
+ 'file': file_path,
+ 'config': config_path,
'status_code': r.status_code,
'server_response': r.text
}
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…