Richkit is a python3 package that provides tools taking a domain name as input, and returns additional information on that domain. It can be an analysis of the domain itself, looked up from data-bases, retrieved from other services, or some combination thereof.
The purpose of richkit is to provide a reusable library of domain name-related analysis, lookups, and retrieval functions, that are shared within the Network Security research group at Aalborg University, and also available to the public for reuse and modification.
Requirements
Python >= 3.5
Installation
In order to install richikit just type in the terminal
pip install richkit
Also Read – Jackdaw : Gather Gather Gather
Usage
The following codes can be used to retrieve the TLD and the URL category, respectively.
>> from richkit.analyse import tld
>> urls = [“www.aau.dk”,”www.github.com”,”www.google.com”]
>>
>> for url in urls:
… print(tld(url))
dk
com
com
>>>from richkit.retrieve.symantec import fetch_from_internet
>>>from richkit.retrieve.symantec import LocalCategoryDB
>>>
>>>urls = [“www.aau.dk”,”www.github.com”,”www.google.com”]
>>>
>>>local_db = LocalCategoryDB()
>>>for url in urls:
… url_category=local_db.get_category(url)
… if url_category==”:
… url_category=fetch_from_internet(url)
… print(url_category)
Education
Technology/Internet
Search Engines/Portals
Modules
Richkit define a set of functions categorized by the following modules:
richkit.analyse
: This module provides functions that can be applied to a domain name. Similarly to richkit.lookup
, and in contrast to richkit.retrieve
, this is done without disclosing the domain name to third parties and breaching confidentiality.richkit.lookup
: This modules provides the ability to look up domain names in local resources, i.e. the domain name cannot be sent of to third parties. The module might fetch resources, such as lists or databasese, but this must be done in a way that keeps the domain name confidential. Contrast this with richkit.retrieve
.richkit.retrieve
: This module provides the ability to retrieve data on domain names of any sort. It comes without the “confidentiality contract” of richkit.lookup
.Credit: indepedenthand
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…