Warning OSINT Toolkit is not production ready yet. This is an early prototype, that still needs some work to be done.
OSINT Toolkit is a self-hostable, on-demand analysis platform designed for security specialists. It consolidates various security tools into a single, easy-to-use environment, streamlining everyday tasks. Optimized for single-user operation, OSINT Toolkit runs locally in a Docker container and is not intended for long-term data storage or management. Instead, it focuses on accelerating daily workflows, such as news aggregation and analysis, IOC and email investigations, and the creation of threat detection rules. To further enhance efficiency, OSINT Toolkit integrates generative AI capabilities, providing additional support for analysis and decision-making.
IPs | Domains | URLs | Emails | Hashes | CVEs |
---|---|---|---|---|---|
AbuseIPDB | Alienvault | Alienvault | Emailrep.io | Alienvault | GitHub |
Alienvault | Checkphish.ai | Checkphish.ai | GitHub | GitHub | NIST NVD |
Checkphish.ai | GitHub | GitHub | Hunter.io | Maltiverse | |
CrowdSec | Maltiverse | Google Safe Browsing | Have I Been Pwnd | Pulsedive | |
GitHub | Pulsedive | Maltiverse | |||
IPQualityScore | Shodan | Pulsedive | ThreatFox | ||
Maltiverse | ThreatFox | Shodan | |||
Pulsedive | ThreatFox | Virustotal | |||
Shodan | |||||
URLScan | |||||
ThreatFox | Virustotal | URLScan | |||
Virustotal | |||||
Virustotal |
The Newsfeed module keeps you up to date about the latest cybersecurity news by aggregating articles from trusted sources such as Wired, The Hacker News, Security Magazine, Threatpost, TechCrunch Security, and Dark Reading. Stay up-to-date with industry trends and potential threats without having to visit multiple websites or subscribe to numerous newsletters. The module extracts IOCs automatically from the news articles and lets you analyze news in no time using AI.
The IOC Lookup module helps you analyze different types of indicators of compromise (IOCs) such as IP addresses, hashes, email addresses, domains, and URLs. It leverages services like VirusTotal, AlienVault, AbuseIPDB, and social media platforms like Reddit and Twitter to gather information about the IOCs. The module automatically detects the type of IOC being analyzed and utilizes the appropriate services to provide relevant information, enabling you to identify potential threats and take necessary actions to protect your organization.
The Email Analyzer module allows you to analyze .eml files for potential threats. Simply drag and drop an .eml file into the module, and it will parse the file, perform basic security checks, extract indicators of compromise (IOCs), and analyze messages with the help of AI. Analyze the IOCs using various open-source intelligence (OSINT) services, and enhance your organization's email security.
The IOC Extractor module allows you to extract and organize IOCs from unstructured files using regular expressions (Regex). It automatically removes duplicates, saving you the effort of sorting through the same IOCs multiple times. Simply drop your file containing the IOCs into the tool, and analyze each detected IOC with a single click.
The Domain Finder module helps you to protect your organization from phishing attacks by searching for recently registered domains that match specific patterns. By utilizing the URLScan.io API, you can view screenshots of websites associated with domains without visiting them directly. Additionally, you can check each domain and its resolved IP against multiple threat intelligence services, further enhancing your organization's security.
The AI Templates module provides powerful AI-based solutions for log data analysis, email text analysis, and source code explanation. It lets you create templates for AI tasks and supports you in the prompt engineering process.
The CVSS Calculator module allows you to calculate the CVSS 3.1 score of a vulnerability and export the calculation as a markdown or JSON file.
The Detection Rules module is a GUI for creating Sigma and Yara rules.
- Download the repository and extract the files
- Navigate to the directory where the
docker-compose.yaml
file is located - If you deploy the app on a remote machine, set the
BACKEND_URL
argument in the Compose file to the remote machines IP address - Run the following command:
docker-compose up -d
- Once the container is running, you can access the app in your browser at http://localhost:3000