Description
[](<https://blogger.googleusercontent.com/img/a/AVvXsEj-2xkDjrkNjk18y9D27uUy_QBa3JSwZq3C1zWDDv4HvcSaRN50GSGfqBnzTwYxEKDV60cU65ZZbD2uF7Fng3Cj3hKn6JAFvxnusfKUCJHi3b-AsjaBL6CbmLpymJgk7U4_91PMejm59_REtqXWMKATRU1Lz9rY-SlGrGV4YeG7TRemM9Xp_lnMsxjdVA=s640>)
Gotanda is OSINT(Open Source Intelligence) Web Extension for Firefox/Chrome.
This Web Extension could search [OSINT](<https://www.kitploit.com/search/label/OSINT> "OSINT" ) information from some IOC in web page.(IP,Domain,URL,SNS...etc)
This Repository partly the studying and JavaScript practice.
Download [link](<https://www.kitploit.com/search/label/Link> "link" ) below.
* [FireFox](<https://addons.mozilla.org/ja/firefox/addon/gotanda/> "FireFox" )
* [Chrome](<https://chrome.google.com/webstore/detail/gotanda/jbmdcdfnnpenkgliplbglfpninigbiml> "Chrome" )
**Usage**
Right click highlighted IOC strings, It will show contextmenus.(Or right clicking any link. )
When You want to search using some engine, You choose one of list.
**Search Engine List**
Name | URL | Category
---|---|---
Domain Tools | <https://whois.domaintools.com/> | whois Lookup
Security Trails | <https://securitytrails.com/> | whois lookup
whoisds | <https://whoisds.com/> | whois lookup
ThreatCrowd | <https://www.threatcrowd.org/> | Domain, IPv4
AbuseIPDB | <https://www.abuseipdb.com/> | IPv4
HackerTarget | <https://hackertarget.com/> | IPv4
Censys | <https://censys.io/> | IP, Domain
Shodan | <https://shodan.io/> | IP, Domain
FOFA | <https://fofa.so/> | IP, Domain
VirusTotal | <https://virustotal.com/> | IP, Domain, URL,Hash
GreyNoise | <https://viz.greynoise.io/> | IPv4
IPAlyzer | <https://ipalyzer.com/> | IPv4
Tor [Relay](<https://www.kitploit.com/search/label/Relay> "Relay" ) Search | <https://metrics.torproject.org/> | IP,Domain
Domain Watch | <https://domainwat.ch/> | Domain, Email,whois lookup
crt.sh | <https://crt.sh/> | SSL-certificate
SecurityHeaders | <https://securityheaders.com/> | URL, Domain
DNSlytics | <https://dnslytics.com/> | IPv4,IPv6,ASN
URLscan | <https://urlscan.io/> | URL
Ultratools | <https://www.ultratools.com/> | IPv6
Wayback Machine | <https://web.archive.org> | URL
aguse | <https://www.aguse.jp/> | URL
check-host | <https://check-host.net/> | URL
CIRCL | <https://cve.circl.lu/> | CVE
FortiGuard | <https://fortiguard.com/> | CVE
Sploitus | <https://sploitus.com/> | CVE
Vulmon | <https://vulmon.com/> | CVE
CXSecurity | <https://cxsecurity.com/> | CVE
Vulncode-DB | <https://www.vulncode-db.com/> | CVE
Malshare | <https://malshare.com/> | MD5 Hash
ThreatCrowd | <https://www.threatcrowd.org/> | IP,Domain
Hybrid Analysis | <https://www.hybrid-analysis.com/> | hash
Twitter | <https://twitter.com/> | SNS, w/TimeLine
Qiita | <https://qiita.com> | SNS
GitHub | <https://github.com> | SNS
Facebook | <https://www.facebook.com/> | SNS, w/TimeLine
Instagram | <https://www.instagram.com/> | SNS
LinkedIn | <https://linkedin.com/> | SNS
Pinterest | <https://www.pinterest.jp> | SNS
reddit | <https://www.reddit.com/> | SNS
About [Twitter](<https://www.kitploit.com/search/label/Twitter> "Twitter" ) and FaceBook could search timeline with any words.
**Misc**
**This extension is optimized for the Japanese environment.**
**[Download Gotanda](<https://github.com/HASH1da1/Gotanda> "Download Gotanda" )**
{"id": "KITPLOIT:516609842825105845", "vendorId": null, "type": "kitploit", "bulletinFamily": "tools", "title": "Gotanda - Browser Web Extension For OSINT", "description": "[](<https://blogger.googleusercontent.com/img/a/AVvXsEj-2xkDjrkNjk18y9D27uUy_QBa3JSwZq3C1zWDDv4HvcSaRN50GSGfqBnzTwYxEKDV60cU65ZZbD2uF7Fng3Cj3hKn6JAFvxnusfKUCJHi3b-AsjaBL6CbmLpymJgk7U4_91PMejm59_REtqXWMKATRU1Lz9rY-SlGrGV4YeG7TRemM9Xp_lnMsxjdVA=s640>)\n\n \n\n\nGotanda is OSINT(Open Source Intelligence) Web Extension for Firefox/Chrome.\n\nThis Web Extension could search [OSINT](<https://www.kitploit.com/search/label/OSINT> \"OSINT\" ) information from some IOC in web page.(IP,Domain,URL,SNS...etc)\n\nThis Repository partly the studying and JavaScript practice.\n\nDownload [link](<https://www.kitploit.com/search/label/Link> \"link\" ) below.\n\n * [FireFox](<https://addons.mozilla.org/ja/firefox/addon/gotanda/> \"FireFox\" )\n\n * [Chrome](<https://chrome.google.com/webstore/detail/gotanda/jbmdcdfnnpenkgliplbglfpninigbiml> \"Chrome\" )\n\n \n\n\n**Usage** \n\n\nRight click highlighted IOC strings, It will show contextmenus.(Or right clicking any link. )\n\nWhen You want to search using some engine, You choose one of list.\n\n \n**Search Engine List** \nName | URL | Category \n---|---|--- \nDomain Tools | <https://whois.domaintools.com/> | whois Lookup \nSecurity Trails | <https://securitytrails.com/> | whois lookup \nwhoisds | <https://whoisds.com/> | whois lookup \nThreatCrowd | <https://www.threatcrowd.org/> | Domain, IPv4 \nAbuseIPDB | <https://www.abuseipdb.com/> | IPv4 \nHackerTarget | <https://hackertarget.com/> | IPv4 \nCensys | <https://censys.io/> | IP, Domain \nShodan | <https://shodan.io/> | IP, Domain \nFOFA | <https://fofa.so/> | IP, Domain \nVirusTotal | <https://virustotal.com/> | IP, Domain, URL,Hash \nGreyNoise | <https://viz.greynoise.io/> | IPv4 \nIPAlyzer | <https://ipalyzer.com/> | IPv4 \nTor [Relay](<https://www.kitploit.com/search/label/Relay> \"Relay\" ) Search | <https://metrics.torproject.org/> | IP,Domain \nDomain Watch | <https://domainwat.ch/> | Domain, Email,whois lookup \ncrt.sh | <https://crt.sh/> | SSL-certificate \nSecurityHeaders | <https://securityheaders.com/> | URL, Domain \nDNSlytics | <https://dnslytics.com/> | IPv4,IPv6,ASN \nURLscan | <https://urlscan.io/> | URL \nUltratools | <https://www.ultratools.com/> | IPv6 \nWayback Machine | <https://web.archive.org> | URL \naguse | <https://www.aguse.jp/> | URL \ncheck-host | <https://check-host.net/> | URL \nCIRCL | <https://cve.circl.lu/> | CVE \nFortiGuard | <https://fortiguard.com/> | CVE \nSploitus | <https://sploitus.com/> | CVE \nVulmon | <https://vulmon.com/> | CVE \nCXSecurity | <https://cxsecurity.com/> | CVE \nVulncode-DB | <https://www.vulncode-db.com/> | CVE \nMalshare | <https://malshare.com/> | MD5 Hash \nThreatCrowd | <https://www.threatcrowd.org/> | IP,Domain \nHybrid Analysis | <https://www.hybrid-analysis.com/> | hash \nTwitter | <https://twitter.com/> | SNS, w/TimeLine \nQiita | <https://qiita.com> | SNS \nGitHub | <https://github.com> | SNS \nFacebook | <https://www.facebook.com/> | SNS, w/TimeLine \nInstagram | <https://www.instagram.com/> | SNS \nLinkedIn | <https://linkedin.com/> | SNS \nPinterest | <https://www.pinterest.jp> | SNS \nreddit | <https://www.reddit.com/> | SNS \n \nAbout [Twitter](<https://www.kitploit.com/search/label/Twitter> \"Twitter\" ) and FaceBook could search timeline with any words.\n\n \n**Misc** \n\n\n**This extension is optimized for the Japanese environment.**\n\n \n \n\n\n**[Download Gotanda](<https://github.com/HASH1da1/Gotanda> \"Download Gotanda\" )**\n", "published": "2021-11-16T20:30:00", "modified": "2021-11-16T20:30:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "http://www.kitploit.com/2021/11/gotanda-browser-web-extension-for-osint.html", "reporter": "KitPloit", "references": ["https://github.com/HASH1da1/Gotanda", "https://github.com"], "cvelist": [], "immutableFields": [], "lastseen": "2022-04-07T12:01:30", "viewCount": 214, "enchantments": {"dependencies": {"references": []}, "score": {"value": -0.5, "vector": "NONE"}, "backreferences": {}, "exploitation": null, "vulnersScore": -0.5}, "_state": {"dependencies": 1659916711, "score": 1659919227}, "_internal": {"score_hash": "060a89b1a22d5e345055fa420053cee2"}, "toolHref": "https://github.com/HASH1da1/Gotanda"}
{}