To perform OSINT search you need a simple tool to get digital data on internet, the simple way is with browser extension, because you don’t need to move from the browser you can perform OSINT together with live data that open in browser. There is a browser extension to perform OSINT search called “Mitaka“.
Mitaka is a browser extension for OSINT search which can:
- Extract & refang IoC from a selected block of text.
- Search / scan it on various engines.
- E.g. VirusTotal, urlscan.io, Censys, Shodan, etc.
|hash||md5 / sha1 / sha256|
|gaPubID||Google Adsense Publisher ID|
|gaTrackID||Google Analytics Tracker ID|
|Urlscan||https://urlscan.io||ip / domain / url|
- Chrome: https://chrome.google.com/webstore/detail/mitaka/bfjbejmeoibbdpfdbmbacmefcbannnbg
- FireFox: https://addons.mozilla.org/en-US/firefox/addon/mitaka/
How to use
This browser extension shows context menus based on a type of IoC you selected and then you can choose what you want to search / scan on.
Please set your urlscan.io & VirusTotal API keys in the options page for enabling urlscan.io & VirusTotal scans.
You can enable / disable a search engine on the options page based on your preference.
This browser extension requires the following permissions.
Read and change all your data on the websites you visit:
- This extension creates context menus dynamically based on what you select on a website.
- It means this extension requires reading all your data on the websites you visit. (This extension doesn’t change anything on the websites)
- This extension makes a notification when something goes wrong.
I don’t (and will never) collect any information from the users.
TypeScript files will start out in
git clone https://github.com/ninoseki/mitaka.git cd mitaka npm install npm run test npm run build
For loading an unpacked extension, please follow the procedures described at https://developer.chrome.com/extensions/getstarted.