Full Code of HASH1da1/Gotanda for AI

master 5f6a20bb5495 cached
5 files
25.6 KB
7.0k tokens
1 symbols
1 requests
Download .txt
Repository: HASH1da1/Gotanda
Branch: master
Commit: 5f6a20bb5495
Files: 5
Total size: 25.6 KB

Directory structure:
gitextract_7xzi3pcq/

├── .gitignore
├── LICENSE
├── README.md
├── background.js
└── manifest.json

================================================
FILE CONTENTS
================================================

================================================
FILE: .gitignore
================================================
*.DS_Store
node_modules/
tmp/
.vscode
/dist

================================================
FILE: LICENSE
================================================


Copyright 2019 HASH1da1

Permission is hereby granted, free of charge, to any person obtaining a copy of this software
and associated documentation files (the "Software"), to deal in the Software without restriction,
including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense,
and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or
substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. 
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, 
DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.


================================================
FILE: README.md
================================================
# Gotanda 

Gotanda is OSINT(Open Source Intelligence) Web Extension for Firefox/Chrome.

This Web Extension could search OSINT information from some IOC in web page.(IP,Domain,URL,SNS...etc)

This Repository partly the studying and JavaScript practice.

Download link below.

- [FireFox](https://addons.mozilla.org/ja/firefox/addon/gotanda/)

- [Chrome](https://chrome.google.com/webstore/detail/gotanda/jbmdcdfnnpenkgliplbglfpninigbiml)

## Usage

Right click highlighted IOC strings, It will show contextmenus.(Or right clicking any link. )

When You want to search using some engine, You choose one of list.

## Search Engine List

|Name|URL|Category|
|:---|:--|:-------|
|Domain Tools|https://whois.domaintools.com/|whois Lookup|
|Security Trails|https://securitytrails.com/|whois lookup|
|whoisds|https://whoisds.com/|whois lookup|
|ThreatCrowd|https://www.threatcrowd.org/|Domain, IPv4|
|AbuseIPDB|https://www.abuseipdb.com/|IPv4|
|HackerTarget|https://hackertarget.com/|IPv4|
|Censys|https://censys.io/|IP, Domain|
|Shodan|https://shodan.io/|IP, Domain|
|VirusTotal|https://virustotal.com/|IP, Domain, URL,Hash|
|GreyNoise|https://viz.greynoise.io/|IPv4|
|IPAlyzer|https://ipalyzer.com/|IPv4|
|Tor Relay Search|https://metrics.torproject.org/|IP,Domain|
|Domain Watch|https://domainwat.ch/|Domain, Email,whois lookup|
|crt.sh|https://crt.sh/|SSL-certificate|
|SecurityHeaders|https://securityheaders.com/|URL, Domain|
|DNSlytics|https://dnslytics.com/|IPv4,IPv6,ASN|
|URLscan|https://urlscan.io/|URL|
|Ultratools|https://www.ultratools.com/|IPv6|
|Wayback Machine|https://web.archive.org|URL|
|aguse|https://www.aguse.jp/|URL|
|check-host|https://check-host.net/|URL|
|CIRCL|https://cve.circl.lu/|CVE|
|FortiGuard|https://fortiguard.com/|CVE|
|Sploitus|https://sploitus.com/|CVE|
|Vulmon|https://vulmon.com/|CVE|
|CXSecurity|https://cxsecurity.com/|CVE|
|Vulncode-DB|https://www.vulncode-db.com/|CVE|
|Malshare|https://malshare.com/|MD5 Hash|
|ThreatCrowd|https://www.threatcrowd.org/|IP,Domain|
|Hybrid Analysis|https://www.hybrid-analysis.com/|hash|
|Twitter|https://twitter.com/|SNS, w/TimeLine|
|Qiita|https://qiita.com|SNS|
|GitHub|https://github.com|SNS|
|Facebook|https://www.facebook.com/|SNS, w/TimeLine|
|Instagram|https://www.instagram.com/|SNS|
|LinkedIn|https://linkedin.com/|SNS|
|Pinterest|https://www.pinterest.jp|SNS|
|reddit|https://www.reddit.com/|SNS|

About Twitter and FaceBook could search timeline with any words.


## Misc

**This extension is optimized for the Japanese environment.**




================================================
FILE: background.js
================================================
// create Whois context menus
chrome.contextMenus.create({
    "id": "whois",
    "title": "whois",
    "contexts":["selection", "link"]
});

// child whois menu

chrome.contextMenus.create({
    "id": "domaintools whois",
    "title": "Domain Tools",
    "contexts":["selection", "link"],
    "parentId": "whois"
});

chrome.contextMenus.create({
    "id": "domainwatch whois",
    "title": "Domainwatch whois",
    "contexts": ["selection", "link"],
    "parentId":"whois"
});

chrome.contextMenus.create({
    "id": "securitytrails whois",
    "title": "SecurityTrails",
    "contexts": ["selection", "link"],
    "parentId":"whois"
});

chrome.contextMenus.create({
    "id": "whoisds",
    "title": "WHOISDS",
    "contexts":["selection", "link"],
    "parentId": "whois"
});

// create IP address context menus

chrome.contextMenus.create({
    "id": "IP",
    "title": "IP",
    "contexts": ["selection", "link"]
})
//IPv4
chrome.contextMenus.create({
    "id": "IPv4",
    "title": "IPv4",
    "contexts":["selection", "link"],
    "parentId":"IP"
});

chrome.contextMenus.create({
    "id":"abuseIPDB",
    "title":"AbuseIPDB",
    "contexts":["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id":"hackertarget IP",
    "title":"HackerTarget",
    "contexts":["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id":"censys IP",
    "title":"Censys",
    "contexts":["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id":"shodan",
    "title":"Shodan IP",
    "contexts":["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id":"virustotal",
    "title":"VirusTotal IP",
    "contexts":["selection", "link"],
    "parentId": "IPv4"
});
chrome.contextMenus.create({
    "id": "greynoise",
    "title": "Greynoise",
    "contexts": ["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id": "dnslytics ip",
    "title": "DNSlytics",
    "contexts": ["selection", "link"],
    "parentId": "IPv4"
})
//IPv4
chrome.contextMenus.create({
    "id": "IPv4",
    "title": "IPv4",
    "contexts":["selection", "link"],
    "parentId":"IP"
});

chrome.contextMenus.create({
    "id":"abuseIPDB",
    "title":"AbuseIPDB",
    "contexts":["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id":"hackertarget IP",
    "title":"HackerTarget",
    "contexts":["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id":"censys IP",
    "title":"Censys",
    "contexts":["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id":"shodan",
    "title":"Shodan IP",
    "contexts":["selection", "link"],
    "parentId": "IPv4"
});


chrome.contextMenus.create({
    "id":"virustotal",
    "title":"VirusTotal IP",
    "contexts":["selection", "link"],
    "parentId": "IPv4"
});
chrome.contextMenus.create({
    "id": "greynoise",
    "title": "Greynoise",
    "contexts": ["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id": "dnslytics ip",
    "title": "DNSlytics",
    "contexts": ["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id": "tor ip",
    "title": "Tor Relay IP",
    "contexts": ["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id": "tor ip",
    "title": "Tor Relay IP",
    "contexts": ["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id": "threatcrowd ip",
    "title": "ThreatCrowd IP",
    "contexts": ["selection", "link"],
    "parentId": "IPv4",
});

chrome.contextMenus.create({
    "id": "ipalyzer",
    "title": "IPAlyzer",
    "contexts":["selection", "link"],
    "parentId": "IPv4"
});

chrome.contextMenus.create({
    "id": "bgpview ip",
    "title": "BGPView IP",
    "contexts": ["selection", "link"],
    "parentId": "IPv4"
});

//IPv6
chrome.contextMenus.create({
    "id": "IPv6",
    "title": "IPv6",
    "contexts": ["selection", "link"],
    "parentId": "IP"
});

chrome.contextMenus.create({
    "id": "dnslytics v6",
    "title": "DNSlytics IPv6",
    "contexts": ["selection", "link"],
    "parentId": "IPv6"
});

chrome.contextMenus.create({
    "id": "ultratools v6",
    "title": "Ultratools v6",
    "contexts": ["selection", "link"],
    "parentId": "IPv6",
});

chrome.contextMenus.create({
    "id": "dnslytics v6",
    "title": "DNSlytics IPv6",
    "contexts": ["selection", "link"],
    "parentId": "IPv6"
});

chrome.contextMenus.create({
    "id": "ultratools v6",
    "title": "Ultratools v6",
    "contexts": ["selection", "link"],
    "parentId": "IPv6"
});


// create ASN search context menus
chrome.contextMenus.create({
    "id": "asn",
    "title": "ASN",
    "contexts": ["selection", "link"]
});

chrome.contextMenus.create({
    "id": "dnslytics asn",
    "title": "DNSlytics ASN",
    "contexts": ["selection", "link"],
    "parentId": "asn",
});

chrome.contextMenus.create({
    "id": "dnslytics asn",
    "title": "DNSlytics ASN",
    "contexts": ["selection", "link"],
    "parentId": "asn"
});

chrome.contextMenus.create({
    "id": "bgpview asn",
    "title": "BGPView ASN",
    "contexts": ["selection", "link"],
    "parentId": "asn"
});

// create Domain search context menus

chrome.contextMenus.create({
    "id": "domain",
    "title": "Domain",
    "contexts":["selection", "link"]
});


chrome.contextMenus.create({
    "id":"censys Domain",
    "title":"Censys",
    "contexts":["selection", "link"],
    "parentId": "domain"
});

chrome.contextMenus.create({
    "id":"shodan Domain",
    "title":"Shodan",
    "contexts":["selection", "link"],
    "parentId": "domain"
});

chrome.contextMenus.create({
    "id":"domainwatch",
    "title":"DomainWatch",
    "contexts":["selection", "link"],
    "parentId": "domain"
});

chrome.contextMenus.create({
    "id":"virustotal Domain",
    "title":"VirusTotal",
    "contexts":["selection", "link"],
    "parentId": "domain"
});

chrome.contextMenus.create({
    "id": "tor domain",
    "title": "Tor Relay domain",
    "contexts": ["selection", "link"],
    "parentId": "domain"
});

chrome.contextMenus.create({
    "id": "threatcrowd domain",
    "title": "ThreatCrowd Domain",
    "contexts": ["selection", "link"],
    "parentId": "domain",
});

chrome.contextMenus.create({
    "id":"censys Domain",
    "title":"Censys",
    "contexts":["selection", "link"],
    "parentId": "domain"
});

chrome.contextMenus.create({
    "id":"shodan Domain",
    "title":"Shodan",
    "contexts":["selection", "link"],
    "parentId": "domain"
});

chrome.contextMenus.create({
    "id": "hackertarget traceroute",
    "title": "HakcerTarget Traceroute",
    "contexts":["selection","link"],
    "parentId": "domain"
});

chrome.contextMenus.create({
    "id":"domainwatch",
    "title":"DomainWatch",
    "contexts":["selection", "link"],
    "parentId": "domain"
});

chrome.contextMenus.create({
    "id":"virustotal Domain",
    "title":"VirusTotal",
    "contexts":["selection", "link"],
    "parentId": "domain"
});

chrome.contextMenus.create({
    "id": "tor domain",
    "title": "Tor Relay domain",
    "contexts": ["selection", "link"],
    "parentId": "domain"
});

chrome.contextMenus.create({
    "id": "threatcrowd domain",
    "title": "ThreatCrowd Domain",
    "contexts": ["selection", "link"],
    "parentId": "domain"
});

// create SSL certificate search context menus

chrome.contextMenus.create({
    "id": "sslcertificate",
    "title":"SSL-Certificate",
    "contexts":["selection", "link"],
});

chrome.contextMenus.create({
    "id":"crt.sh",
    "title":"crt.sh",
    "contexts":["selection","link"],
    "parentId":"sslcertificate"
});

chrome.contextMenus.create({
    "id":"ssl-bl",
    "title":"Abuse.ch SSLBL-Hash",
    "contexts":["selection", "link"],
    "parentId":"sslcertificate"
});

// create URL search context menus

chrome.contextMenus.create({
    "id": "URL",
    "title": "URL",
    "contexts": ["selection", "link"]
});

chrome.contextMenus.create({
    "id":"urlscan",
    "title":"URLscan",
    "contexts":["selection", "link"],
    "parentId": "URL"
});

chrome.contextMenus.create({
    "id":"aguse",
    "title":"aguse.jp",
    "contexts":["selection","link"],
    "parentId":"URL"
});

chrome.contextMenus.create({
    "id":"check-host",
    "title":"Check-Host",
    "contexts":["selection","link"],
    "parentId":"URL",
});

chrome.contextMenus.create({
    "id":"urlscan",
    "title":"URLscan",
    "contexts":["selection", "link"],
    "parentId": "URL"
});

chrome.contextMenus.create({
    "id": "archive",
    "title": "Wayback Machine",
    "contexts": ["selection", "link"],
    "parentId": "URL"
});


//create Vulnerability context menus
chrome.contextMenus.create({
    "id": "Vuln",
    "title": "Vuln",
    "contexts":["selection", "link"]
});

chrome.contextMenus.create({
    "id": "fortiguard",
    "title": "FortiGuard CVE",
    "contexts":["selection", "link"],
    "parentId": "Vuln"
});

chrome.contextMenus.create({
    "id": "sploitus",
    "title": "Sploitus",
    "contexts":["selection", "link"],
    "parentId": "Vuln"
});

chrome.contextMenus.create({
    "id": "vulmon",
    "title":"Vulmon",
    "contexts":["selection", "link"],
    "parentId": "Vuln"
});

chrome.contextMenus.create({
    "id": "cxsecurity",
    "title": "CXSecurity",
    "contexts":["selection", "link" ],
    "parentId": "Vuln"
});

chrome.contextMenus.create({
    "id": "vulncode",
    "title": "Vulncode DB",
    "contexts": ["selection", "link"],
    "parentId": "Vuln"
});

// Create Malicious Software Search context menus
chrome.contextMenus.create({
    "id": "hash",
    "title": "Hashes",
    "contexts":["selection", "link"]
});

chrome.contextMenus.create({
    "id": "malshare",
    "title": "Malshare",
    "contexts":["selection", "link"],
    "parentId": "hash"
});

chrome.contextMenus.create({
    "id": "virustotal hash",
    "title": "VirusTotal Hash",
    "contexts": ["selection", "link"],
    "parentId": "hash"
});

chrome.contextMenus.create({
    "id": "circl",
    "title": "CIRCL CVE",
    "contexts": ["selection","link"],
    "parentId": "Vuln"
});

chrome.contextMenus.create({
    "id": "fortiguard",
    "title": "FortiGuard CVE",
    "contexts":["selection", "link"],
    "parentId": "Vuln"
});

chrome.contextMenus.create({
    "id": "sploitus",
    "title": "Sploitus",
    "contexts":["selection", "link"],
    "parentId": "Vuln"
});

chrome.contextMenus.create({
    "id": "vulmon",
    "title":"Vulmon",
    "contexts":["selection", "link"],
    "parentId": "Vuln"
});

chrome.contextMenus.create({
    "id": "cxsecurity",
    "title": "CXSecurity",
    "contexts":["selection", "link" ],
    "parentId": "Vuln"
});

chrome.contextMenus.create({
    "id": "vulncode",
    "title": "Vulncode DB",
    "contexts": ["selection", "link"],
    "parentId": "Vuln"
});

// Create Malicious Software Search context menus
chrome.contextMenus.create({
    "id": "hash",
    "title": "Hashes",
    "contexts":["selection", "link"]
});

chrome.contextMenus.create({
    "id": "malshare",
    "title": "Malshare",
    "contexts":["selection", "link"],
    "parentId": "hash"
});

chrome.contextMenus.create({
    "id": "virustotal hash",
    "title": "VirusTotal Hash",
    "contexts": ["selection", "link"],
    "parentId": "hash" 
});

chrome.contextMenus.create({
    "id":"hybrid analysis",
    "title": "Hybrid Analysis Hash",
    "contexts":["selection", "link"],
    "parentId":"hash"
});

//create SNS search context menus

chrome.contextMenus.create({
    "id": "social",
    "title": "Social",
    "contexts":["selection", "link"]
});

chrome.contextMenus.create({
    "id":"twitter",
    "title":"Twitter",
    "contexts":["selection", "link"],
    "parentId": "social"
});

chrome.contextMenus.create({
    "id":"qiita",
    "title":"Qiita",
    "contexts":["selection", "link"],
    "parentId": "social"
});

chrome.contextMenus.create({
    "id":"github",
    "title":"Github",
    "contexts":["selection", "link"],
    "parentId": "social"
});

//SNS Account search
chrome.contextMenus.create({
    "id": "social account",
    "title": "Social Account",
    "contexts":["selection","link"],
    "parentId": "social"
});

chrome.contextMenus.create({
    "id":"twitter",
    "title":"Twitter",
    "contexts":["selection", "link"],
    "parentId": "social account"
});

chrome.contextMenus.create({
    "id":"qiita",
    "title":"Qiita",
    "contexts":["selection", "link"],
    "parentId": "social account"
});

chrome.contextMenus.create({
    "id":"github",
    "title":"Github",
    "contexts":["selection", "link"],
    "parentId": "social account"
});


chrome.contextMenus.create({
    "id":"facebook",
    "title":"FaceBook",
    "contexts":["selection", "link"],
    "parentId": "social"
});

chrome.contextMenus.create({
    "id":"instagram",
    "title":"Instagram",
    "contexts":["selection", "link"],
    "parentId": "social"
});

chrome.contextMenus.create({
    "id":"linkedin",
    "title":"LinkedIn",
    "contexts":["selection", "link"],
    "parentId": "social"
});

chrome.contextMenus.create({
    "id": "pinterest",
    "title": "Pinterest",
    "contexts":["selection", "link"],
    "parentId": "social"
});

chrome.contextMenus.create({
    "id":"facebook",
    "title":"FaceBook",
    "contexts":["selection", "link"],
    "parentId": "social account"
});

chrome.contextMenus.create({
    "id":"instagram",
    "title":"Instagram",
    "contexts":["selection", "link"],
    "parentId": "social account"
});

chrome.contextMenus.create({
    "id":"linkedin",
    "title":"LinkedIn",
    "contexts":["selection", "link"],
    "parentId": "social account"
});

chrome.contextMenus.create({
    "id": "pinterest",
    "title": "Pinterest",
    "contexts":["selection", "link"],
    "parentId": "social account"
});


//SNS Timeline search
chrome.contextMenus.create({
    "id": "timeline",
    "title": "TimeLine",
    "contexts":["selection", "link"],
    "parentId": "social"
});

chrome.contextMenus.create({
    "id": "twittertl",
    "title": "Twitter Timeline",
    "contexts":["selection","link"],
    "parentId": "timeline"
});

chrome.contextMenus.create({
    "id": "facebooktl",
    "title": "FaceBook TimeLine",
    "contexts":["selection","link"],
    "parentId": "timeline"
});

chrome.contextMenus.create({
    "id": "reddit",
    "title": "reddit",
    "contexts":["selection","link"],
    "parentId": "timeline"
});


//create empty variables
var url = "";
var artifact = "";
var v6URI = "";

//refang function
function refangArtifact(artifact){
    while(artifact.includes("[.]")){
        artifact = artifact.replace("[.]",".");
    }
    if(artifact.includes("hxxp://")){
        artifact = artifact.replace("hxxp://","http://");
    }
    if(artifact.includes("hxxps://")){
        artifact = artifact.replace("hxxps://","https://");
    }
    if(artifact.includes("[:]//")){
        artifact = artifact.replace("[:]//","://")
    }
    return artifact;
};


// when you click event listener function

chrome.contextMenus.onClicked.addListener((info, tab) => {
    // strip leading and trailing spaces
    if (info.selectionText) {
        artifact = String(info.selectionText).trim();
        v6URI = encodeURIComponent(info.selectionText);
    } else if (info.linkUrl) {
        var link = new URL(info.linkUrl);
        artifact = link.host;
    } else if (info.srcUrl) {
        var src = new URL(info.srcUrl);
        artifact = src.host;
    }
    
    artifact = refangArtifact(artifact);

switch (info.menuItemId){
    //whois
    case "domaintools whois":
        url = "https://whois.domaintools.com/"+artifact;
        break;

    case "domainwatch whois":
        url ="https://domainwat.ch/whois/"+artifact;
        break;

    case "securitytrails whois":
        url = "https://securitytrails.com/domain/"+artifact+"/dns";
        break;

    case "whoisds":
        url = "https://whoisds.com/whois-lookup/lookup?domain="+artifact;
        break;

    //IPv4
    case "abuseIPDB":
        url = "https://www.abuseipdb.com/check/"+artifact;
        break;
    
    case "hackertarget IP":
        url = "https://api.hackertarget.com/reverseiplookup/?q="+artifact;
        break;
    
    case "censys IP":
        url = "https://search.censys.io/hosts/"+artifact;
        break;
    
    case "shodan":
        url = "https://www.shodan.io/host/"+artifact;
        break;

    case "virustotal":
        url = "https://virustotal.com/#/ip-address/"+artifact;
        break;

    case "greynoise":
        url = "https://viz.greynoise.io/ip/"+artifact;
        break;
    case "dnslytics ip":
        url = "https://dnslytics.com/ip/"+artifact;
        break;  

    case "tor ip":
        url = "https://metrics.torproject.org/rs.html#search/"+artifact;
        break;

    case "threatcrowd ip":
        url = "https://www.threatcrowd.org/ip.php?ip="+artifact;
        break;  
    
    case "ipalyzer":
        url = "https://ipalyzer.com/"+artifact;
        break;

    case "bgpview ip":
        url = "https://bgpview.io/ip/"+artifact;
        break;
    //IPv6

    case "dnslytics v6":
        url ="https://dnslytics.com/ipv6/"+artifact;
        break;
    
    case "ultratools v6":
        url ="https://www.ultratools.com/tools/ipv6InfoResult?ipAddress="+v6URI;
        break;

    //ASN
    case "dnslytics asn":
        url ="https://dnslytics.com/bgp/"+artifact.toLowerCase();
        break;

    case "bgpview asn":
        url = "https://bgpview.io/asn"+artifact;
        break;
    
        
    //Domain

    case "censys Domain":
        url = "https://search.censys.io/search?resource=hosts&sort=RELEVANCE&per_page=25&virtual_hosts=EXCLUDE&q="+artifact;
        break;
    
    case "shodan Domain":
        url = "https://www.shodan.io/search?query="+artifact;
        break;

    case "hackertarget traceroute":
        url = "https://api.hackertarget.com/mtr/?q="+artifact;
        break;

    case "domainwatch":
        url = "https://domainwat.ch/site/"+artifact;
        break;
    
    case "virustotal Domain":
        url = "https://virustotal.com/#/domain/"+artifact;
        break;

    case "tor domain":
        url = "https://metrics.torproject.org/rs.html#search/"+artifact;
        break;

    case "threatcrowd domain":
        url= "https://www.threatcrowd.org/domain.php?domain="+artifact;
        break;

    case "urlhaus domain":
        url = "https://urlhaus.abuse.ch/browse.php?search="+artifact;
        break;

    case "securityheaders domain":
        url = "https://securityheaders.com/?q="+artifact+"&followRedirects=on";
        break;

    // certificate
    
    case "crt.sh":
        url="https://crt.sh/?q="+artifact;
        break;

    case "ssl-bl":
        url ="https://sslbl.abuse.ch/ssl-certificates/sha1/"+artifact;
        break;

    //URL

    case "urlscan":
        url = "https://urlscan.io/api/v1/search/?q=domain:"+artifact;
        break;
    
    case "aguse":
        url = "https://www.aguse.jp/?url="+encodeURIComponent(artifact);
        break;

    case "check-host":
        url = "https://check-host.net/ip-info?host="+artifact;
        break;

    case "archive":
        url = "https://web.archive.org/web/*/"+artifact;
        break;

    //Vuln
    case "circl":
        url = "https://cve.circl.lu/cve/"+artifact;
        break;

    case "fortiguard":
        url = "https://fortiguard.com/search?q="+artifact+"&engine=3";
        break;

    case "sploitus":
        url = "https://sploitus.com/?query="+artifact+"#exploits";
        break;

    case "vulmon":
        url = "https://vulmon.com/searchpage?q="+artifact;
        break;
    
    case "cxsecurity":
        url = "https://cxsecurity.com/cveshow/"+artifact;
        break;

    case "vulncode":
        url = "https://www.vulncode-db.com/"+artifact;
        break;

    //hashes
    case "malshare":
        url = "https://malshare.com/search.php?query="+artifact;
        break;

    case "virustotal hash":
        url = "https://www.virustotal.com/gui/search/"+artifact;
        break;

    case "hybrid analysis":
        url = "https://www.hybrid-analysis.com/sample/"+artifact;
        break;

    //SNS

    case "twitter":
        url = "https://twitter.com/"+artifact;
        break;

    case "qiita":
        url = "https://qiita.com/"+artifact;
        break;

    case "github":
        url = "https://github.com/"+artifact;
        break;

    case "facebook":
        url = "https://www.facebook.com/public/"+artifact;
        break;
    
    case "instagram":
        url = "https://www.instagram.com/"+artifact;
        break;

    case "linkedin":
        url = "https://www.linkedin.com/in/"+artifact;
        break;

    case "pinterest":
        url = "https://www.pinterest.jp/"+artifact;
        break;
    
    //SNS timeline search
    case "twittertl":
        url = "https://twitter.com/search?q="+artifact;
        break;
    
    case "facebooktl":
        url = "https://www.facebook.com/search/top/?q="+artifact;
        break;
    
    case "reddit":
        url = "https://www.reddit.com/search/?q="+artifact;
        break;

};

chrome.tabs.create({url: url});
});


================================================
FILE: manifest.json
================================================
{
    "manifest_version": 2,
    "name": "Gotanda",
    "description": "OSINT addon",
    "version": "1.8.2",
    "icons": {
        "128": "image/128.png"
    },
    "background": {
        "scripts": ["background.js"],
        "persistent": false
    },
    "permissions": [
        "contextMenus",
        "background"
    ]
}
Download .txt
gitextract_7xzi3pcq/

├── .gitignore
├── LICENSE
├── README.md
├── background.js
└── manifest.json
Download .txt
SYMBOL INDEX (1 symbols across 1 files)

FILE: background.js
  function refangArtifact (line 708) | function refangArtifact(artifact){
Condensed preview — 5 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (31K chars).
[
  {
    "path": ".gitignore",
    "chars": 43,
    "preview": "*.DS_Store\nnode_modules/\ntmp/\n.vscode\n/dist"
  },
  {
    "path": "LICENSE",
    "chars": 1053,
    "preview": "\n\nCopyright 2019 HASH1da1\n\nPermission is hereby granted, free of charge, to any person obtaining a copy of this software"
  },
  {
    "path": "README.md",
    "chars": 2521,
    "preview": "# Gotanda \n\nGotanda is OSINT(Open Source Intelligence) Web Extension for Firefox/Chrome.\n\nThis Web Extension could searc"
  },
  {
    "path": "background.js",
    "chars": 22295,
    "preview": "// create Whois context menus\r\nchrome.contextMenus.create({\r\n    \"id\": \"whois\",\r\n    \"title\": \"whois\",\r\n    \"contexts\":["
  },
  {
    "path": "manifest.json",
    "chars": 347,
    "preview": "{\r\n    \"manifest_version\": 2,\r\n    \"name\": \"Gotanda\",\r\n    \"description\": \"OSINT addon\",\r\n    \"version\": \"1.8.2\",\r\n    \""
  }
]

About this extraction

This page contains the full source code of the HASH1da1/Gotanda GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 5 files (25.6 KB), approximately 7.0k tokens, and a symbol index with 1 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.

Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.

Copied to clipboard!