This plugin for PowerToys Run allows you to quickly search for an IP address, domain name, hash, or any other data point in a list of Cyber Security tools.
It’s perfect for security analysts, penetration testers, or anyone else who needs to quickly look up information when investigating artifacts or alerts.
To install the plugin:
C:\Program Files\PowerToys\modules\launcher\Plugins
C:\Users\<yourusername>\AppData\Local\PowerToys\modules\launcher\Plugins
ql
To use the plugin, simply open PowerToys Run by pressing Alt+Space and type the activation command ql
followed by the tool category and the data you want to lookup.
The plugin will open the data searched in a new tab in your default browser for each tool registered with that category.
This plugin currently comes by default with the following tools:
NOTE: Prior to version 1.3.0, the default configuration file was used.
The plugin will now automatically convert the tools.conf
list to tools.json
if it does not already exist in JSON form and will then default to using that instead.
The legacy config file will remain, but will not be used and will not be included in future builds starting from v1.3.0
By default, the plugin will use the preconfigured tools listed above. You can modify these settings by editing the tools.json
file in the plugin folder.
The format for the configuration file follows the below standard:
{
"Name": "VirusTotal",
"URL": "https://www.virustotal.com/gui/search/{0}",
"Categories": [ "ip", "domain", "hash"],
"Enabled": true
}
In the URL, {0}
will be replace with the search input. As such, only sites that work based on URL data (GET Requests) are supported for now.
For example, https://www.virustotal.com/gui/search/{0}
would become https://www.virustotal.com/gui/search/1.1.1.1
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…