Skip to content

JanoutV/osint-collector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

osint-collector

OSINT Collector - Tool for OSINT analysis

About

OSINT Collector is a simple command-line tool designed to query threat intelligence feeds. It makes investigating easier via terminal instead of using the web interface. Currently, 3 threat intelligence feeds are supported: AlienVault OTX, VirusTotal and IPDB. The results are printed to stdout.

Install the Python tool

cd osint-collector
pip/pip3 install virtualenv
virtualenv venv
source venv/bin/activate
pip install -r requirements.txt

Create an account and generate API keys for threat intelligence feeds

Add API keys to config.ini in this format

Create a config.ini file in the osint_collector folder and add the following content.

[API_KEYS]
AVT = <API_KEY_FROM_ALIEN_VAULT>
VT = <API_KEY_FROM_VIRUS_TOTAL>
ABUSE = <API_KEY_FROM_ABUSEIPDB>

Launch using python3 within the virtual environment

python3 osint_collector/oc.py --help
usage: oc.py [-h] [-d DOMAIN] [-a] [-i IP] [-u URL] [-H HASH] [-p PULSE] [-s]

OSINT Collector

optional arguments:
  -h, --help            show this help message and exit
  -d DOMAIN, --domain DOMAIN
                        Domain, for example: vut.cz
  -a, --all             Get unfiltered, unformated output from the API's.
  -i IP, --ip IP        IPv4 eg: 8.8.8.8
  -u URL, --url URL     URL eg; http://www.vut.cz
  -H HASH, --hash HASH  Hash of a file, MD5, SHA256, etc.
  -p PULSE, --pulse PULSE
                        Search OTX pulses for a string eg: Dridex
  -s, --subscribed      Get Alien Vault pulses you are subscribed to

OSINT Collector, Written by Vladimir Janout, 2022, [email protected]

About

OSINT Collector - Tool for OSINT analysis

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages