Mitaka: A Browser Extension for Streamlined OSINT Search
Summary
Mitaka is a powerful browser extension designed to simplify Open Source Intelligence (OSINT) searches. It automates the selection of Indicators of Compromise (IoCs) and supports over 65 services for comprehensive threat intelligence gathering. This tool is essential for security professionals and researchers looking to enhance their investigative workflows directly from their browser.
Repository Info
Tags
Click on any tag to explore related repositories
Introduction
Mitaka is an indispensable browser extension developed by ninoseki, aimed at making OSINT (Open Source Intelligence) search and scanning significantly easier. It's built with security professionals, threat intelligence analysts, and researchers in mind, providing a seamless way to investigate various indicators of compromise (IoCs) directly from any webpage.
One of its standout features is the automatic IoC selection with "refanging," which intelligently converts obfuscated indicators like example[.]com to example.com or hxxp://example.com to http://example.com. This capability, combined with support for over 65 different services, makes Mitaka a powerful tool for quick and efficient intelligence gathering.
Installation
Installing Mitaka is straightforward. It is available for both Chrome and Firefox browsers.
- For Chrome: You can find and install it from the Chrome Web Store.
- For Firefox: It's available on Mozilla Add-ons.
After installation, remember to grant the necessary permissions, especially for Firefox, to ensure the extension functions correctly. For advanced features like HybridAnalysis, urlscan.io, and VirusTotal scans, you may need to set up API keys in the extension's options.
Examples
Mitaka excels in identifying and processing various Indicators of Compromise (IoCs). Users can effortlessly select and investigate types such as:
- ASN (e.g.,
AS13335) - BTC and ETH addresses
- CVE numbers (e.g.,
CVE-2018-11776) - Domain names (e.g.,
github.com) - Email addresses (e.g.,
test@test.com) - Hashes (MD5, SHA1, SHA256)
- IP addresses (e.g.,
8.8.8.8) - URLs (e.g.,
https://github.com)
The extension automatically "refangs" obfuscated IoCs, converting formats like example[.]com to example.com or hxxp://example.com to http://example.com, making them immediately actionable. Once an IoC is selected, Mitaka provides context menu options to query over 65 integrated services, including prominent platforms like VirusTotal, Shodan, Censys, AbuseIPDB, OTX, and many others, offering a comprehensive view of potential threats.
Why Use It
Mitaka significantly enhances the efficiency of OSINT investigations. Its automatic IoC refanging saves time by cleaning up obfuscated data, making it ready for direct search. With support for a vast number of search and scan engines, it centralizes access to critical intelligence sources, eliminating the need to manually copy-paste IoCs into multiple platforms. This extension is invaluable for anyone involved in cybersecurity, threat hunting, or digital forensics, providing a rapid and comprehensive way to gather information and assess potential threats. Its user-friendly interface and customizable options further contribute to a tailored and effective intelligence workflow.
Links
- GitHub Repository: https://github.com/ninoseki/mitaka
- Chrome Web Store: https://chrome.google.com/webstore/detail/mitaka/bfjbejmeoibbdpfdbmbacmefcbannnbg
- Mozilla Add-ons: https://addons.mozilla.org/en-US/firefox/addon/mitaka/
- Privacy Policy: https://ninoseki.github.io/chrome-webstore/privacy-policy/