logo
DATABASE RESOURCES PRICING ABOUT US

Mitaka - A Browser Extension For OSINT Search

Description

[![](https://1.bp.blogspot.com/-9cslz9huO_U/XYAeBJbmtNI/AAAAAAAAQXo/vfBLw3xqV-stKkRe0MzCd4fOhcbHSMVCwCNcBGAsYHQ/s640/mitaka_8_eyecatch.png)](<https://1.bp.blogspot.com/-9cslz9huO_U/XYAeBJbmtNI/AAAAAAAAQXo/vfBLw3xqV-stKkRe0MzCd4fOhcbHSMVCwCNcBGAsYHQ/s1600/mitaka_8_eyecatch.png>) Mitaka is a browser extension for [OSINT](<https://www.kitploit.com/search/label/OSINT> "OSINT" ) search which can: * Extract & refang IoC from a selected block of text. * E.g. `example[.]com` to `example.com`, `test[at]example.com` to `some-email@example.com`, `hxxp://example.com` to `http://example.com`, etc. * Search / scan it on various engines. * E.g. VirusTotal, urlscan.io, Censys, Shodan, etc. **Features** **Supported IOC types** name | desc. | e.g. ---|---|--- text | Freetext | any string(s) ip | IPv4 address | `8.8.8.8` domain | Domain name | `github.com` url | URL | `https://github.com` email | Email address | `some-email@example.com` asn | ASN | `AS13335` hash | md5 / sha1 / sha256 | `44d88612fea8a8f36de82e1278abb02f` cve | CVE number | `CVE-2018-11776` btc | BTC address | `1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa` gaPubID | Google Adsense Publisher ID | `pub-9383614236930773` gaTrackID | Google [Analytics](<https://www.kitploit.com/search/label/Analytics> "Analytics" ) Tracker ID | `UA-67609351-1` **Supported search engines** name | url | supported types ---|---|--- AbuseIPDB | [https://www.abuseipdb.com](<https://www.abuseipdb.com/> "https://www.abuseipdb.com" ) | ip archive.org | [https://archive.org](<https://archive.org/> "https://archive.org" ) | url archive.today | [http://archive.fo](<http://archive.fo/> "http://archive.fo" ) | url BGPView | [https://bgpview.io](<https://bgpview.io/> "https://bgpview.io" ) | ip / asn BinaryEdge | [https://app.binaryedge.io](<https://app.binaryedge.io/> "https://app.binaryedge.io" ) | ip / domain BitcoinAbuse | [https://www.bitcoinabuse.com](<https://www.bitcoinabuse.com/> "https://www.bitcoinabuse.com" ) | btc Blockchain.com | [https://www.blockchain.com](<https://www.blockchain.com/> "https://www.blockchain.com" ) | btc BlockCypher | [https://live.blockcypher.com](<https://live.blockcypher.com/> "https://live.blockcypher.com" ) | btc Censys | [https://censys.io](<https://censys.io/> "https://censys.io" ) | ip / domain / asn / text crt.sh | [https://crt.sh](<https://crt.sh/> "https://crt.sh" ) | domain DNSlytics | [https://dnslytics.com](<https://dnslytics.com/> "https://dnslytics.com" ) | ip / domain DomainBigData | [https://domainbigdata.com](<https://domainbigdata.com/> "https://domainbigdata.com" ) | domain DomainTools | [https://www.domaintools.com](<https://www.domaintools.com/> "https://www.domaintools.com" ) | ip / domain DomainWatch | [https://domainwat.ch](<https://domainwat.ch/> "https://domainwat.ch" ) | domain / email EmailRep | [https://emailrep.io](<https://emailrep.io/> "https://emailrep.io" ) | email FindSubDomains | [https://findsubdomains.com](<https://findsubdomains.com/> "https://findsubdomains.com" ) | domain FOFA | [https://fofa.so](<https://fofa.so/> "https://fofa.so" ) | ip / domain FortiGuard | [https://fortiguard.com](<https://fortiguard.com/> "https://fortiguard.com" ) | ip / url / cve Google Safe Browsing | [https://transparencyreport.google.com](<https://transparencyreport.google.com/> "https://transparencyreport.google.com" ) | domain / url GreyNoise | [https://viz.greynoise.io](<https://viz.greynoise.io/> "https://viz.greynoise.io" ) | ip / domain / asn Hashdd | [https://hashdd.com](<https://hashdd.com/> "https://hashdd.com" ) | ip / domain / hash HybridAnalysis | [https://www.hybrid-analysis.com](<https://www.hybrid-analysis.com/> "https://www.hybrid-analysis.com" ) | ip / domain / hash (sha256 only) Intelligence X | [https://intelx.io](<https://intelx.io/> "https://intelx.io" ) | ip / domain / url / email / btc IPinfo | [https://ipinfo.io](<https://ipinfo.io/> "https://ipinfo.io" ) | ip / asn IPIP | [https://en.ipip.net](<https://en.ipip.net/> "https://en.ipip.net" ) | ip / asn Joe Sandbox | [https://www.joesandbox.com](<https://www.joesandbox.com/> "https://www.joesandbox.com" ) | hash MalShare | [https://malshare.com](<https://malshare.com/> "https://malshare.com" ) | hash Maltiverse | [https://www.maltiverse.com](<https://www.maltiverse.com/> "https://www.maltiverse.com" ) | domain / hash NVD | [https://nvd.nist.gov](<https://nvd.nist.gov/> "https://nvd.nist.gov" ) | cve OOCPR | [https://data.occrp.org](<https://data.occrp.org/> "https://data.occrp.org" ) | email ONYPHE | [https://www.onyphe.io](<https://www.onyphe.io/> "https://www.onyphe.io" ) | ip OTX | [https://otx.alienvault.com](<https://otx.alienvault.com/> "https://otx.alienvault.com" ) | ip / domain / hash PubDB | [http://pub-db.com](<http://pub-db.com/> "http://pub-db.com" ) | gaPubID / gaTrackID PublicWWW | [https://publicwww.com](<https://publicwww.com/> "https://publicwww.com" ) | text Pulsedive | [https://pulsedive.com](<https://pulsedive.com/> "https://pulsedive.com" ) | ip / domaion / url / hash RiskIQ | [http://community.riskiq.com](<http://community.riskiq.com/> "http://community.riskiq.com" ) | ip / domain / email / gaTrackID SecurityTrails | [https://securitytrails.com](<https://securitytrails.com/> "https://securitytrails.com" ) | ip / domain / email Shodan | [https://www.shodan.io](<https://www.shodan.io/> "https://www.shodan.io" ) | ip / domain / asn Sploitus | [https://sploitus.com](<https://sploitus.com/> "https://sploitus.com" ) | cve SpyOnWeb | [http://spyonweb.com](<http://spyonweb.com/> "http://spyonweb.com" ) | ip / domain / gaPubID / gaTrackID Talos | [https://talosintelligence.com](<https://talosintelligence.com/> "https://talosintelligence.com" ) | ip / domain ThreatConnect | [https://app.threatconnect.com](<https://app.threatconnect.com/> "https://app.threatconnect.com" ) | ip / domain / email ThreatCrowd | [https://www.threatcrowd.org](<https://www.threatcrowd.org/> "https://www.threatcrowd.org" ) | ip / domain / email ThreatMiner | [https://www.threatminer.org](<https://www.threatminer.org/> "https://www.threatminer.org" ) | ip / domain / hash TIP | [https://threatintelligenceplatform.com](<https://threatintelligenceplatform.com/> "https://threatintelligenceplatform.com" ) | ip / domain Urlscan | [https://urlscan.io](<https://urlscan.io/> "https://urlscan.io" ) | ip / domain / asn / url ViewDNS | [https://viewdns.info](<https://viewdns.info/> "https://viewdns.info" ) | ip / domain / email VirusTotal | [https://www.virustotal.com](<https://www.virustotal.com/> "https://www.virustotal.com" ) | ip / domain / url / hash Vulmon | [https://vulmon.com](<https://vulmon.com/> "https://vulmon.com" ) | cve VulncodeDB | [https://www.vulncode-db.com](<https://www.vulncode-db.com/> "https://www.vulncode-db.com" ) | cve VxCube | [http://vxcube.com](<http://vxcube.com/> "http://vxcube.com" ) | ip / domain / hash WebAnalyzer | [https://wa-com.com](<https://wa-com.com/> "https://wa-com.com" ) | domain We Leak Info | [https://weleakinfo.com](<https://weleakinfo.com/> "https://weleakinfo.com" ) | email X-Force Exchange | [https://exchange.xforce.ibmcloud.com](<https://exchange.xforce.ibmcloud.com/> "https://exchange.xforce.ibmcloud.com" ) | ip / domain / hash ZoomEye | [https://www.zoomeye.org](<https://www.zoomeye.org/> "https://www.zoomeye.org" ) | ip **Supported scan engines** name | url | supported types ---|---|--- Urlscan | [https://urlscan.io](<https://urlscan.io/> "https://urlscan.io" ) | ip / domain / url VirusTotal | [https://www.virustotal.com](<https://www.virustotal.com/> "https://www.virustotal.com" ) | url **Downloads** * Chrome: <https://chrome.google.com/webstore/detail/mitaka/bfjbejmeoibbdpfdbmbacmefcbannnbg> * FireFox: <https://addons.mozilla.org/en-US/firefox/addon/mitaka/> **How to use** This browser extension shows context menus based on a type of IoC you selected and then you can choose what you want to search / scan on. **Examples:** [![](https://1.bp.blogspot.com/-2tdM6fuXGfQ/XYAeOc1TdNI/AAAAAAAAQXs/o9Yh-_pJEdwOcF-5KM-3Hj9CjQSlHLl5wCNcBGAsYHQ/s640/mitaka_9_1.gif)](<https://1.bp.blogspot.com/-2tdM6fuXGfQ/XYAeOc1TdNI/AAAAAAAAQXs/o9Yh-_pJEdwOcF-5KM-3Hj9CjQSlHLl5wCNcBGAsYHQ/s1600/mitaka_9_1.gif>) [![](https://1.bp.blogspot.com/-4t9b6shG_iQ/XYAeOVytJkI/AAAAAAAAQXw/b4P4PJz5gU0lDqmKpJ9dL3jhiUVXkhOxwCNcBGAsYHQ/s640/mitaka_10_2.gif)](<https://1.bp.blogspot.com/-4t9b6shG_iQ/XYAeOVytJkI/AAAAAAAAQXw/b4P4PJz5gU0lDqmKpJ9dL3jhiUVXkhOxwCNcBGAsYHQ/s1600/mitaka_10_2.gif>) **Note:** Please set your urlscan.io & [VirusTotal](<https://www.kitploit.com/search/label/VirusTotal> "VirusTotal" ) API keys in the options page for enabling urlscan.io & VirusTotal scans. **Options** You can enable / disable a search engine on the options page based on your preference. [![](https://1.bp.blogspot.com/-dP_LGUSsF1M/XYAeT14bPsI/AAAAAAAAQX0/U7gyifaFxOgCv92e0_k0fugVzaLMShGIACNcBGAsYHQ/s640/mitaka_11_options.png)](<https://1.bp.blogspot.com/-dP_LGUSsF1M/XYAeT14bPsI/AAAAAAAAQX0/U7gyifaFxOgCv92e0_k0fugVzaLMShGIACNcBGAsYHQ/s1600/mitaka_11_options.png>) **About Permissons** This browser extension requires the following permissions. * `Read and change all your data on the websites you visit`: * This extension creates context menus dynamically based on what you select on a website. * It means this extension requires reading all your data on the websites you visit. (This extension doesn't change anything on the websites) * `Display notifications`: * This extension makes a notification when something goes wrong. I don't (and will never) collect any information from the users. **Alternatives or Similar Tools** * [CrowdScrape](<https://chrome.google.com/webstore/detail/crowdscrape/jjplaeklnlddpkbbdbnogmppffokemej> "CrowdScrape" ) * [Gotanda](<https://github.com/HASH1da1/Gotanda> "Gotanda" ) * [Sputnik](<https://github.com/mitchmoser/sputnik> "Sputnik" ) * [ThreatConnect Integrated ](<https://chrome.google.com/webstore/detail/threatconnect-integrated/lblgcphpihpadjdpjgjnnoikjdjcnkbh> "ThreatConnect Integrated " )[Chrome](<https://www.kitploit.com/search/label/Chrome> "Chrome" ) Extension * [ThreatPinch Lookup](<https://github.com/cloudtracer/ThreatPinchLookup> "ThreatPinch Lookup" ) * [VTchromizer](<https://chrome.google.com/webstore/detail/vtchromizer/efbjojhplkelaegfbieplglfidafgoka> "VTchromizer" ) **How to build (for developers)** This browser extension is written in [TypeScript](<https://www.typescriptlang.org/> "TypeScript" ) and built by [webpack](<https://webpack.js.org/> "webpack" ). TypeScript files will start out in `src` directory, run through the TypeScript compiler, then webpack, and end up in JavaScript files in `dist` directory. git clone https://github.com/ninoseki/mitaka.git cd mitaka npm install npm run test npm run build For loading an unpacked extension, please follow the procedures described at <https://developer.chrome.com/extensions/getstarted>. **Misc** Mitaka/見たか means "Have you seen it?" in Japanese. **[Download Mitaka](<https://github.com/ninoseki/mitaka> "Download Mitaka" )**


Related