A tool to search Aviation-related intelligence from public sources. AVOSINT is a cutting-edge tool designed to extract and analyze aviation-related intelligence from public sources.
It utilizes powerful OSINT techniques to monitor aircraft movements, gather historical data, and retrieve detailed aircraft information.
This article explores how AVOSINT can be deployed and its various capabilities in aviation intelligence gathering.
docker run -p 3001:3001 axarev/parsr
./avosint.py [--action ACTION] [--tail-number TAIL-NUMBER] [--icao ICAO]
With ACTION being either ICAO
, tail
, convert
, monitor
tail
– Gather infos starting from tail number. Option --tail-number
is required.
convert
– Convert USA hex to ICAO. Option --icao
is required.
monitor
– Gathers positionnal information from osint sources and detects hovering patterns. Requires --icao
number
Returns the following informations when possible:
The following display is then presented:
Current Status: [Done]
Last action: tail
Current tail: {tail_n}
==========================================
✈️ Aircraft infos:
Manufacturer: {}
Manufacturer Serial Number: {}
Tail Number: {}
Call Sign: {}
Last known position: {}
Last known altitude: {}
???? Owner infos
Name: {}
Street: {}
City: {}
ZIP: {}
Country: {}
New Action [ICAO, tail, convert, monitor, exit, quit] (None):
pip install -r requirements.txt
This tool also uses the OpenSkyApi available. Install it using:
git clone https://github.com/openskynetwork/opensky-api
pip install -e /path/to/repository/python
docker run -p 3001:3001 axarev/parsr
As some registers are in the form of a pdf file, AVOSINT uses parsr Due to a bug in the current version of the parsr library (axa-group/Parsr#565 (comment)) it is necessary to apply the following fix in the parsr-client
python library:
return {
- 'file': file,
- 'config': config,
+ 'file': file_path,
+ 'config': config_path,
'status_code': r.status_code,
'server_response': r.text
}
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…