Designed as a full-stack web application, this tool amalgamates a plethora of services to streamline the work of security analysts.
Dive into this article to explore its integrated features, planned enhancements, and its potential to revolutionize threat detection and response.
Warning OSINT Toolkit is not production ready yet. This is an early prototype, that still needs some work to be done.
OSINT Toolkit is a full-stack web application designed to assist security analysts in their work.
It combines various functions and services into a single tool, making it easier for analysts to identify potential threats and stay updated with the latest developments in the field of cybersecurity.
IPs | Domains | URLs | Emails | Hashes | CVEs |
---|---|---|---|---|---|
AbuseIPDB | Alienvault | Alienvault | Emailrep.io | Alienvault | GitHub |
Alienvault | Checkphish.ai | Checkphish.ai | GitHub | GitHub | NIST NVD |
Checkphish.ai | GitHub | GitHub | Hunter.io | Maltiverse | |
CrowdSec | Maltiverse | Google Safe Browsing | Have I Been Pwnd | Pulsedive | |
GitHub | Pulsedive | Maltiverse | |||
IPQualityScore | Shodan | Pulsedive | ThreatFox | ||
Maltiverse | ThreatFox | Shodan | |||
Pulsedive | ThreatFox | Virustotal | |||
Shodan | |||||
URLScan | |||||
ThreatFox | Virustotal | URLScan | |||
Virustotal | |||||
Virustotal |
The Newsfeed module keeps you informed about the latest cybersecurity news by aggregating articles from trusted sources such as Wired, The Hacker News, Security Magazine, Threatpost, TechCrunch Security, and Dark Reading.
Stay up-to-date with industry trends and potential threats without having to visit multiple websites or subscribe to numerous newsletters.
The IOC Analyzer module helps you analyze different types of indicators of compromise (IOCs) such as IP addresses, hashes, email addresses, domains, and URLs.
It leverages services like VirusTotal, AlienVault, AbuseIPDB, and social media platforms like Reddit and Twitter to gather information about the IOCs.
The module automatically detects the type of IOC being analyzed and utilizes the appropriate services to provide relevant information, enabling you to identify potential threats and take necessary actions to protect your organization.
For more information click here.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…