Mitaka is a browser extension for OSINT search which can:
- Extract & refang IoC from a selected block of text.
- Search / scan it on various engines.
- E.g. VirusTotal, urlscan.io, Censys, Shodan, etc.
Supported IOC types
|hash||md5 / sha1 / sha256|
|gaPubID||Google Adsense Publisher ID|
|gaTrackID||Google Analytics Tracker ID|
Supported search engines
Supported scan engines
|Urlscan||https://urlscan.io||ip / domain / url|
- Chrome: https://chrome.google.com/webstore/detail/mitaka/bfjbejmeoibbdpfdbmbacmefcbannnbg
- FireFox: https://addons.mozilla.org/en-US/firefox/addon/mitaka/
How to use
This browser extension shows context menus based on a type of IoC you selected and then you can choose what you want to search / scan on.
Please set your urlscan.io & VirusTotal API keys in the options page for enabling urlscan.io & VirusTotal scans.
You can enable / disable a search engine on the options page based on your preference.
This browser extension requires the following permissions.
Read and change all your data on the websites you visit:
- This extension creates context menus dynamically based on what you select on a website.
- It means this extension requires reading all your data on the websites you visit. (This extension doesn’t change anything on the websites)
- This extension makes a notification when something goes wrong.
I don’t (and will never) collect any information from the users.
Alternatives or Similar Tools
How to build (for developers)
This browser extension is written in TypeScript and built by webpack.
TypeScript files will start out in
git clone https://github.com/ninoseki/mitaka.git cd mitaka npm install npm run test npm run build
For loading an unpacked extension, please follow the procedures described at https://developer.chrome.com/extensions/getstarted.
Mitaka/見たか means “Have you seen it?” in Japanese.