Mitaka is a browser extension for OSINT search which can:
example[.]com
to example.com
, test[at]example.com
to test@example.com
, hxxp://example.com
to http://example.com
, etc.Features
name | desc. | e.g. |
---|---|---|
text | Freetext | any string(s) |
ip | IPv4 address | 8.8.8.8 |
domain | Domain name | github.com |
url | URL | https://github.com |
Email address | test@test.com | |
asn | ASN | AS13335 |
hash | md5 / sha1 / sha256 | 44d88612fea8a8f36de82e1278abb02f |
cve | CVE number | CVE-2018-11776 |
btc | BTC address | 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa |
gaPubID | Google Adsense Publisher ID | pub-9383614236930773 |
gaTrackID | Google Analytics Tracker ID | UA-67609351-1 |
Also Read – Act Platform : Open Platform For Collection & Exchange Of Threat Intelligence Information
name | url | supported types |
---|---|---|
Urlscan | https://urlscan.io | ip / domain / url |
VirusTotal | https://www.virustotal.com | url |
How to use?
This browser extension shows context menus based on a type of IoC you selected and then you can choose what you want to search / scan on.
Examples:
Note:
Please set your urlscan.io & VirusTotal API keys in the options page for enabling urlscan.io & VirusTotal scans.
You can enable / disable a search engine on the options page based on your preference.
About Permissons
This browser extension requires the following permissions.
Read and change all your data on the websites you visit
:Display notifications
:I don’t (and will never) collect any information from the users.
How to build (for developers)
This browser extension is written in TypeScript and built by webpack.
TypeScript files will start out in src
directory, run through the TypeScript compiler, then webpack, and end up in JavaScript files in dist
directory.
git clone https://github.com/ninoseki/mitaka.git
cd mitaka
npm install
npm run test
npm run build
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…