bevigil-cli
provides a unified command line interface and python library for using BeVigil OSINT API. BeVigil CLI provides an efficient command line interface and Python library for interacting with the BeVigil OSINT API.
This article offers a detailed guide on installing, configuring, and utilizing BeVigil CLI to harness the power of OSINT for cybersecurity.
Explore the diverse commands available to extract valuable data assets quickly and effectively.
The easiest way to install the BeVigil OSINT CLI is to use pip:
$ pip3 install bevigil-cli
If you already have the bevigil-cli package installed and want to upgrade to the latest version, you can run:
$ pip3 install --upgrade bevigil-cli
This will install the bevigil-cli package as well as all dependencies.
Before using the bevigil-cli to extract assets, you need to configure your api key. You can do this using the init
command:
$ bevigil-cli init --api-key <API_KEY>
To get an API key, you can register at BeVigil’s website
Once the API key is configured, you can request BeVigil’s OSINT API for different types of assets.
The enum
command consists of subcommands to enumerate different assets collected by BeVigil OSINT API. Following are all the supported subcommands under enum
group including their options.
Enumerate assets using BeVigil OSINT API
Options:
-h, --help Show this message and exit.
Commands:
hosts Request hosts present in an android package
packages Request packages associated associated with a domain/subdomain
params Request params associated with an android package
s3 Request S3 buckets associated with a package or a keyword
subdomains Request subdomains associated with a domain
urls Request URLs associated with a domain
wordlist Request a wordlist for a package
To request a wordlist crafted from an android pacakge:
$ bevigil-cli enum wordlist --package "com.whatsapp"
{
"package_id": "com.whatsapp",
"raw_wordlist": [
"header.json",
"content.json",
"change_number_contacts.json",
"manifest.json",
"client_search.php",
"metadata.json",
"verification.php",
"debuginfo.json",
"payments_error_map.json",
"ephemeral_settings_lottie_animation.json",
"/DCIM/Camera",
"/native-libs/",
"/timer/stop:",
"/cgroup",
"/bg_non_interactive",
"/dev/null",
]
}
For more information click here.
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…