Repository: HASH1da1/Gotanda
Branch: master
Commit: 5f6a20bb5495
Files: 5
Total size: 25.6 KB
Directory structure:
gitextract_7xzi3pcq/
├── .gitignore
├── LICENSE
├── README.md
├── background.js
└── manifest.json
================================================
FILE CONTENTS
================================================
================================================
FILE: .gitignore
================================================
*.DS_Store
node_modules/
tmp/
.vscode
/dist
================================================
FILE: LICENSE
================================================
Copyright 2019 HASH1da1
Permission is hereby granted, free of charge, to any person obtaining a copy of this software
and associated documentation files (the "Software"), to deal in the Software without restriction,
including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense,
and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so,
subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or
substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
================================================
FILE: README.md
================================================
# Gotanda
Gotanda is OSINT(Open Source Intelligence) Web Extension for Firefox/Chrome.
This Web Extension could search OSINT information from some IOC in web page.(IP,Domain,URL,SNS...etc)
This Repository partly the studying and JavaScript practice.
Download link below.
- [FireFox](https://addons.mozilla.org/ja/firefox/addon/gotanda/)
- [Chrome](https://chrome.google.com/webstore/detail/gotanda/jbmdcdfnnpenkgliplbglfpninigbiml)
## Usage
Right click highlighted IOC strings, It will show contextmenus.(Or right clicking any link. )
When You want to search using some engine, You choose one of list.
## Search Engine List
|Name|URL|Category|
|:---|:--|:-------|
|Domain Tools|https://whois.domaintools.com/|whois Lookup|
|Security Trails|https://securitytrails.com/|whois lookup|
|whoisds|https://whoisds.com/|whois lookup|
|ThreatCrowd|https://www.threatcrowd.org/|Domain, IPv4|
|AbuseIPDB|https://www.abuseipdb.com/|IPv4|
|HackerTarget|https://hackertarget.com/|IPv4|
|Censys|https://censys.io/|IP, Domain|
|Shodan|https://shodan.io/|IP, Domain|
|VirusTotal|https://virustotal.com/|IP, Domain, URL,Hash|
|GreyNoise|https://viz.greynoise.io/|IPv4|
|IPAlyzer|https://ipalyzer.com/|IPv4|
|Tor Relay Search|https://metrics.torproject.org/|IP,Domain|
|Domain Watch|https://domainwat.ch/|Domain, Email,whois lookup|
|crt.sh|https://crt.sh/|SSL-certificate|
|SecurityHeaders|https://securityheaders.com/|URL, Domain|
|DNSlytics|https://dnslytics.com/|IPv4,IPv6,ASN|
|URLscan|https://urlscan.io/|URL|
|Ultratools|https://www.ultratools.com/|IPv6|
|Wayback Machine|https://web.archive.org|URL|
|aguse|https://www.aguse.jp/|URL|
|check-host|https://check-host.net/|URL|
|CIRCL|https://cve.circl.lu/|CVE|
|FortiGuard|https://fortiguard.com/|CVE|
|Sploitus|https://sploitus.com/|CVE|
|Vulmon|https://vulmon.com/|CVE|
|CXSecurity|https://cxsecurity.com/|CVE|
|Vulncode-DB|https://www.vulncode-db.com/|CVE|
|Malshare|https://malshare.com/|MD5 Hash|
|ThreatCrowd|https://www.threatcrowd.org/|IP,Domain|
|Hybrid Analysis|https://www.hybrid-analysis.com/|hash|
|Twitter|https://twitter.com/|SNS, w/TimeLine|
|Qiita|https://qiita.com|SNS|
|GitHub|https://github.com|SNS|
|Facebook|https://www.facebook.com/|SNS, w/TimeLine|
|Instagram|https://www.instagram.com/|SNS|
|LinkedIn|https://linkedin.com/|SNS|
|Pinterest|https://www.pinterest.jp|SNS|
|reddit|https://www.reddit.com/|SNS|
About Twitter and FaceBook could search timeline with any words.
## Misc
**This extension is optimized for the Japanese environment.**
================================================
FILE: background.js
================================================
// create Whois context menus
chrome.contextMenus.create({
"id": "whois",
"title": "whois",
"contexts":["selection", "link"]
});
// child whois menu
chrome.contextMenus.create({
"id": "domaintools whois",
"title": "Domain Tools",
"contexts":["selection", "link"],
"parentId": "whois"
});
chrome.contextMenus.create({
"id": "domainwatch whois",
"title": "Domainwatch whois",
"contexts": ["selection", "link"],
"parentId":"whois"
});
chrome.contextMenus.create({
"id": "securitytrails whois",
"title": "SecurityTrails",
"contexts": ["selection", "link"],
"parentId":"whois"
});
chrome.contextMenus.create({
"id": "whoisds",
"title": "WHOISDS",
"contexts":["selection", "link"],
"parentId": "whois"
});
// create IP address context menus
chrome.contextMenus.create({
"id": "IP",
"title": "IP",
"contexts": ["selection", "link"]
})
//IPv4
chrome.contextMenus.create({
"id": "IPv4",
"title": "IPv4",
"contexts":["selection", "link"],
"parentId":"IP"
});
chrome.contextMenus.create({
"id":"abuseIPDB",
"title":"AbuseIPDB",
"contexts":["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id":"hackertarget IP",
"title":"HackerTarget",
"contexts":["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id":"censys IP",
"title":"Censys",
"contexts":["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id":"shodan",
"title":"Shodan IP",
"contexts":["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id":"virustotal",
"title":"VirusTotal IP",
"contexts":["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id": "greynoise",
"title": "Greynoise",
"contexts": ["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id": "dnslytics ip",
"title": "DNSlytics",
"contexts": ["selection", "link"],
"parentId": "IPv4"
})
//IPv4
chrome.contextMenus.create({
"id": "IPv4",
"title": "IPv4",
"contexts":["selection", "link"],
"parentId":"IP"
});
chrome.contextMenus.create({
"id":"abuseIPDB",
"title":"AbuseIPDB",
"contexts":["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id":"hackertarget IP",
"title":"HackerTarget",
"contexts":["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id":"censys IP",
"title":"Censys",
"contexts":["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id":"shodan",
"title":"Shodan IP",
"contexts":["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id":"virustotal",
"title":"VirusTotal IP",
"contexts":["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id": "greynoise",
"title": "Greynoise",
"contexts": ["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id": "dnslytics ip",
"title": "DNSlytics",
"contexts": ["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id": "tor ip",
"title": "Tor Relay IP",
"contexts": ["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id": "tor ip",
"title": "Tor Relay IP",
"contexts": ["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id": "threatcrowd ip",
"title": "ThreatCrowd IP",
"contexts": ["selection", "link"],
"parentId": "IPv4",
});
chrome.contextMenus.create({
"id": "ipalyzer",
"title": "IPAlyzer",
"contexts":["selection", "link"],
"parentId": "IPv4"
});
chrome.contextMenus.create({
"id": "bgpview ip",
"title": "BGPView IP",
"contexts": ["selection", "link"],
"parentId": "IPv4"
});
//IPv6
chrome.contextMenus.create({
"id": "IPv6",
"title": "IPv6",
"contexts": ["selection", "link"],
"parentId": "IP"
});
chrome.contextMenus.create({
"id": "dnslytics v6",
"title": "DNSlytics IPv6",
"contexts": ["selection", "link"],
"parentId": "IPv6"
});
chrome.contextMenus.create({
"id": "ultratools v6",
"title": "Ultratools v6",
"contexts": ["selection", "link"],
"parentId": "IPv6",
});
chrome.contextMenus.create({
"id": "dnslytics v6",
"title": "DNSlytics IPv6",
"contexts": ["selection", "link"],
"parentId": "IPv6"
});
chrome.contextMenus.create({
"id": "ultratools v6",
"title": "Ultratools v6",
"contexts": ["selection", "link"],
"parentId": "IPv6"
});
// create ASN search context menus
chrome.contextMenus.create({
"id": "asn",
"title": "ASN",
"contexts": ["selection", "link"]
});
chrome.contextMenus.create({
"id": "dnslytics asn",
"title": "DNSlytics ASN",
"contexts": ["selection", "link"],
"parentId": "asn",
});
chrome.contextMenus.create({
"id": "dnslytics asn",
"title": "DNSlytics ASN",
"contexts": ["selection", "link"],
"parentId": "asn"
});
chrome.contextMenus.create({
"id": "bgpview asn",
"title": "BGPView ASN",
"contexts": ["selection", "link"],
"parentId": "asn"
});
// create Domain search context menus
chrome.contextMenus.create({
"id": "domain",
"title": "Domain",
"contexts":["selection", "link"]
});
chrome.contextMenus.create({
"id":"censys Domain",
"title":"Censys",
"contexts":["selection", "link"],
"parentId": "domain"
});
chrome.contextMenus.create({
"id":"shodan Domain",
"title":"Shodan",
"contexts":["selection", "link"],
"parentId": "domain"
});
chrome.contextMenus.create({
"id":"domainwatch",
"title":"DomainWatch",
"contexts":["selection", "link"],
"parentId": "domain"
});
chrome.contextMenus.create({
"id":"virustotal Domain",
"title":"VirusTotal",
"contexts":["selection", "link"],
"parentId": "domain"
});
chrome.contextMenus.create({
"id": "tor domain",
"title": "Tor Relay domain",
"contexts": ["selection", "link"],
"parentId": "domain"
});
chrome.contextMenus.create({
"id": "threatcrowd domain",
"title": "ThreatCrowd Domain",
"contexts": ["selection", "link"],
"parentId": "domain",
});
chrome.contextMenus.create({
"id":"censys Domain",
"title":"Censys",
"contexts":["selection", "link"],
"parentId": "domain"
});
chrome.contextMenus.create({
"id":"shodan Domain",
"title":"Shodan",
"contexts":["selection", "link"],
"parentId": "domain"
});
chrome.contextMenus.create({
"id": "hackertarget traceroute",
"title": "HakcerTarget Traceroute",
"contexts":["selection","link"],
"parentId": "domain"
});
chrome.contextMenus.create({
"id":"domainwatch",
"title":"DomainWatch",
"contexts":["selection", "link"],
"parentId": "domain"
});
chrome.contextMenus.create({
"id":"virustotal Domain",
"title":"VirusTotal",
"contexts":["selection", "link"],
"parentId": "domain"
});
chrome.contextMenus.create({
"id": "tor domain",
"title": "Tor Relay domain",
"contexts": ["selection", "link"],
"parentId": "domain"
});
chrome.contextMenus.create({
"id": "threatcrowd domain",
"title": "ThreatCrowd Domain",
"contexts": ["selection", "link"],
"parentId": "domain"
});
// create SSL certificate search context menus
chrome.contextMenus.create({
"id": "sslcertificate",
"title":"SSL-Certificate",
"contexts":["selection", "link"],
});
chrome.contextMenus.create({
"id":"crt.sh",
"title":"crt.sh",
"contexts":["selection","link"],
"parentId":"sslcertificate"
});
chrome.contextMenus.create({
"id":"ssl-bl",
"title":"Abuse.ch SSLBL-Hash",
"contexts":["selection", "link"],
"parentId":"sslcertificate"
});
// create URL search context menus
chrome.contextMenus.create({
"id": "URL",
"title": "URL",
"contexts": ["selection", "link"]
});
chrome.contextMenus.create({
"id":"urlscan",
"title":"URLscan",
"contexts":["selection", "link"],
"parentId": "URL"
});
chrome.contextMenus.create({
"id":"aguse",
"title":"aguse.jp",
"contexts":["selection","link"],
"parentId":"URL"
});
chrome.contextMenus.create({
"id":"check-host",
"title":"Check-Host",
"contexts":["selection","link"],
"parentId":"URL",
});
chrome.contextMenus.create({
"id":"urlscan",
"title":"URLscan",
"contexts":["selection", "link"],
"parentId": "URL"
});
chrome.contextMenus.create({
"id": "archive",
"title": "Wayback Machine",
"contexts": ["selection", "link"],
"parentId": "URL"
});
//create Vulnerability context menus
chrome.contextMenus.create({
"id": "Vuln",
"title": "Vuln",
"contexts":["selection", "link"]
});
chrome.contextMenus.create({
"id": "fortiguard",
"title": "FortiGuard CVE",
"contexts":["selection", "link"],
"parentId": "Vuln"
});
chrome.contextMenus.create({
"id": "sploitus",
"title": "Sploitus",
"contexts":["selection", "link"],
"parentId": "Vuln"
});
chrome.contextMenus.create({
"id": "vulmon",
"title":"Vulmon",
"contexts":["selection", "link"],
"parentId": "Vuln"
});
chrome.contextMenus.create({
"id": "cxsecurity",
"title": "CXSecurity",
"contexts":["selection", "link" ],
"parentId": "Vuln"
});
chrome.contextMenus.create({
"id": "vulncode",
"title": "Vulncode DB",
"contexts": ["selection", "link"],
"parentId": "Vuln"
});
// Create Malicious Software Search context menus
chrome.contextMenus.create({
"id": "hash",
"title": "Hashes",
"contexts":["selection", "link"]
});
chrome.contextMenus.create({
"id": "malshare",
"title": "Malshare",
"contexts":["selection", "link"],
"parentId": "hash"
});
chrome.contextMenus.create({
"id": "virustotal hash",
"title": "VirusTotal Hash",
"contexts": ["selection", "link"],
"parentId": "hash"
});
chrome.contextMenus.create({
"id": "circl",
"title": "CIRCL CVE",
"contexts": ["selection","link"],
"parentId": "Vuln"
});
chrome.contextMenus.create({
"id": "fortiguard",
"title": "FortiGuard CVE",
"contexts":["selection", "link"],
"parentId": "Vuln"
});
chrome.contextMenus.create({
"id": "sploitus",
"title": "Sploitus",
"contexts":["selection", "link"],
"parentId": "Vuln"
});
chrome.contextMenus.create({
"id": "vulmon",
"title":"Vulmon",
"contexts":["selection", "link"],
"parentId": "Vuln"
});
chrome.contextMenus.create({
"id": "cxsecurity",
"title": "CXSecurity",
"contexts":["selection", "link" ],
"parentId": "Vuln"
});
chrome.contextMenus.create({
"id": "vulncode",
"title": "Vulncode DB",
"contexts": ["selection", "link"],
"parentId": "Vuln"
});
// Create Malicious Software Search context menus
chrome.contextMenus.create({
"id": "hash",
"title": "Hashes",
"contexts":["selection", "link"]
});
chrome.contextMenus.create({
"id": "malshare",
"title": "Malshare",
"contexts":["selection", "link"],
"parentId": "hash"
});
chrome.contextMenus.create({
"id": "virustotal hash",
"title": "VirusTotal Hash",
"contexts": ["selection", "link"],
"parentId": "hash"
});
chrome.contextMenus.create({
"id":"hybrid analysis",
"title": "Hybrid Analysis Hash",
"contexts":["selection", "link"],
"parentId":"hash"
});
//create SNS search context menus
chrome.contextMenus.create({
"id": "social",
"title": "Social",
"contexts":["selection", "link"]
});
chrome.contextMenus.create({
"id":"twitter",
"title":"Twitter",
"contexts":["selection", "link"],
"parentId": "social"
});
chrome.contextMenus.create({
"id":"qiita",
"title":"Qiita",
"contexts":["selection", "link"],
"parentId": "social"
});
chrome.contextMenus.create({
"id":"github",
"title":"Github",
"contexts":["selection", "link"],
"parentId": "social"
});
//SNS Account search
chrome.contextMenus.create({
"id": "social account",
"title": "Social Account",
"contexts":["selection","link"],
"parentId": "social"
});
chrome.contextMenus.create({
"id":"twitter",
"title":"Twitter",
"contexts":["selection", "link"],
"parentId": "social account"
});
chrome.contextMenus.create({
"id":"qiita",
"title":"Qiita",
"contexts":["selection", "link"],
"parentId": "social account"
});
chrome.contextMenus.create({
"id":"github",
"title":"Github",
"contexts":["selection", "link"],
"parentId": "social account"
});
chrome.contextMenus.create({
"id":"facebook",
"title":"FaceBook",
"contexts":["selection", "link"],
"parentId": "social"
});
chrome.contextMenus.create({
"id":"instagram",
"title":"Instagram",
"contexts":["selection", "link"],
"parentId": "social"
});
chrome.contextMenus.create({
"id":"linkedin",
"title":"LinkedIn",
"contexts":["selection", "link"],
"parentId": "social"
});
chrome.contextMenus.create({
"id": "pinterest",
"title": "Pinterest",
"contexts":["selection", "link"],
"parentId": "social"
});
chrome.contextMenus.create({
"id":"facebook",
"title":"FaceBook",
"contexts":["selection", "link"],
"parentId": "social account"
});
chrome.contextMenus.create({
"id":"instagram",
"title":"Instagram",
"contexts":["selection", "link"],
"parentId": "social account"
});
chrome.contextMenus.create({
"id":"linkedin",
"title":"LinkedIn",
"contexts":["selection", "link"],
"parentId": "social account"
});
chrome.contextMenus.create({
"id": "pinterest",
"title": "Pinterest",
"contexts":["selection", "link"],
"parentId": "social account"
});
//SNS Timeline search
chrome.contextMenus.create({
"id": "timeline",
"title": "TimeLine",
"contexts":["selection", "link"],
"parentId": "social"
});
chrome.contextMenus.create({
"id": "twittertl",
"title": "Twitter Timeline",
"contexts":["selection","link"],
"parentId": "timeline"
});
chrome.contextMenus.create({
"id": "facebooktl",
"title": "FaceBook TimeLine",
"contexts":["selection","link"],
"parentId": "timeline"
});
chrome.contextMenus.create({
"id": "reddit",
"title": "reddit",
"contexts":["selection","link"],
"parentId": "timeline"
});
//create empty variables
var url = "";
var artifact = "";
var v6URI = "";
//refang function
function refangArtifact(artifact){
while(artifact.includes("[.]")){
artifact = artifact.replace("[.]",".");
}
if(artifact.includes("hxxp://")){
artifact = artifact.replace("hxxp://","http://");
}
if(artifact.includes("hxxps://")){
artifact = artifact.replace("hxxps://","https://");
}
if(artifact.includes("[:]//")){
artifact = artifact.replace("[:]//","://")
}
return artifact;
};
// when you click event listener function
chrome.contextMenus.onClicked.addListener((info, tab) => {
// strip leading and trailing spaces
if (info.selectionText) {
artifact = String(info.selectionText).trim();
v6URI = encodeURIComponent(info.selectionText);
} else if (info.linkUrl) {
var link = new URL(info.linkUrl);
artifact = link.host;
} else if (info.srcUrl) {
var src = new URL(info.srcUrl);
artifact = src.host;
}
artifact = refangArtifact(artifact);
switch (info.menuItemId){
//whois
case "domaintools whois":
url = "https://whois.domaintools.com/"+artifact;
break;
case "domainwatch whois":
url ="https://domainwat.ch/whois/"+artifact;
break;
case "securitytrails whois":
url = "https://securitytrails.com/domain/"+artifact+"/dns";
break;
case "whoisds":
url = "https://whoisds.com/whois-lookup/lookup?domain="+artifact;
break;
//IPv4
case "abuseIPDB":
url = "https://www.abuseipdb.com/check/"+artifact;
break;
case "hackertarget IP":
url = "https://api.hackertarget.com/reverseiplookup/?q="+artifact;
break;
case "censys IP":
url = "https://search.censys.io/hosts/"+artifact;
break;
case "shodan":
url = "https://www.shodan.io/host/"+artifact;
break;
case "virustotal":
url = "https://virustotal.com/#/ip-address/"+artifact;
break;
case "greynoise":
url = "https://viz.greynoise.io/ip/"+artifact;
break;
case "dnslytics ip":
url = "https://dnslytics.com/ip/"+artifact;
break;
case "tor ip":
url = "https://metrics.torproject.org/rs.html#search/"+artifact;
break;
case "threatcrowd ip":
url = "https://www.threatcrowd.org/ip.php?ip="+artifact;
break;
case "ipalyzer":
url = "https://ipalyzer.com/"+artifact;
break;
case "bgpview ip":
url = "https://bgpview.io/ip/"+artifact;
break;
//IPv6
case "dnslytics v6":
url ="https://dnslytics.com/ipv6/"+artifact;
break;
case "ultratools v6":
url ="https://www.ultratools.com/tools/ipv6InfoResult?ipAddress="+v6URI;
break;
//ASN
case "dnslytics asn":
url ="https://dnslytics.com/bgp/"+artifact.toLowerCase();
break;
case "bgpview asn":
url = "https://bgpview.io/asn"+artifact;
break;
//Domain
case "censys Domain":
url = "https://search.censys.io/search?resource=hosts&sort=RELEVANCE&per_page=25&virtual_hosts=EXCLUDE&q="+artifact;
break;
case "shodan Domain":
url = "https://www.shodan.io/search?query="+artifact;
break;
case "hackertarget traceroute":
url = "https://api.hackertarget.com/mtr/?q="+artifact;
break;
case "domainwatch":
url = "https://domainwat.ch/site/"+artifact;
break;
case "virustotal Domain":
url = "https://virustotal.com/#/domain/"+artifact;
break;
case "tor domain":
url = "https://metrics.torproject.org/rs.html#search/"+artifact;
break;
case "threatcrowd domain":
url= "https://www.threatcrowd.org/domain.php?domain="+artifact;
break;
case "urlhaus domain":
url = "https://urlhaus.abuse.ch/browse.php?search="+artifact;
break;
case "securityheaders domain":
url = "https://securityheaders.com/?q="+artifact+"&followRedirects=on";
break;
// certificate
case "crt.sh":
url="https://crt.sh/?q="+artifact;
break;
case "ssl-bl":
url ="https://sslbl.abuse.ch/ssl-certificates/sha1/"+artifact;
break;
//URL
case "urlscan":
url = "https://urlscan.io/api/v1/search/?q=domain:"+artifact;
break;
case "aguse":
url = "https://www.aguse.jp/?url="+encodeURIComponent(artifact);
break;
case "check-host":
url = "https://check-host.net/ip-info?host="+artifact;
break;
case "archive":
url = "https://web.archive.org/web/*/"+artifact;
break;
//Vuln
case "circl":
url = "https://cve.circl.lu/cve/"+artifact;
break;
case "fortiguard":
url = "https://fortiguard.com/search?q="+artifact+"&engine=3";
break;
case "sploitus":
url = "https://sploitus.com/?query="+artifact+"#exploits";
break;
case "vulmon":
url = "https://vulmon.com/searchpage?q="+artifact;
break;
case "cxsecurity":
url = "https://cxsecurity.com/cveshow/"+artifact;
break;
case "vulncode":
url = "https://www.vulncode-db.com/"+artifact;
break;
//hashes
case "malshare":
url = "https://malshare.com/search.php?query="+artifact;
break;
case "virustotal hash":
url = "https://www.virustotal.com/gui/search/"+artifact;
break;
case "hybrid analysis":
url = "https://www.hybrid-analysis.com/sample/"+artifact;
break;
//SNS
case "twitter":
url = "https://twitter.com/"+artifact;
break;
case "qiita":
url = "https://qiita.com/"+artifact;
break;
case "github":
url = "https://github.com/"+artifact;
break;
case "facebook":
url = "https://www.facebook.com/public/"+artifact;
break;
case "instagram":
url = "https://www.instagram.com/"+artifact;
break;
case "linkedin":
url = "https://www.linkedin.com/in/"+artifact;
break;
case "pinterest":
url = "https://www.pinterest.jp/"+artifact;
break;
//SNS timeline search
case "twittertl":
url = "https://twitter.com/search?q="+artifact;
break;
case "facebooktl":
url = "https://www.facebook.com/search/top/?q="+artifact;
break;
case "reddit":
url = "https://www.reddit.com/search/?q="+artifact;
break;
};
chrome.tabs.create({url: url});
});
================================================
FILE: manifest.json
================================================
{
"manifest_version": 2,
"name": "Gotanda",
"description": "OSINT addon",
"version": "1.8.2",
"icons": {
"128": "image/128.png"
},
"background": {
"scripts": ["background.js"],
"persistent": false
},
"permissions": [
"contextMenus",
"background"
]
}
gitextract_7xzi3pcq/ ├── .gitignore ├── LICENSE ├── README.md ├── background.js └── manifest.json
SYMBOL INDEX (1 symbols across 1 files)
FILE: background.js
function refangArtifact (line 708) | function refangArtifact(artifact){
Condensed preview — 5 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (31K chars).
[
{
"path": ".gitignore",
"chars": 43,
"preview": "*.DS_Store\nnode_modules/\ntmp/\n.vscode\n/dist"
},
{
"path": "LICENSE",
"chars": 1053,
"preview": "\n\nCopyright 2019 HASH1da1\n\nPermission is hereby granted, free of charge, to any person obtaining a copy of this software"
},
{
"path": "README.md",
"chars": 2521,
"preview": "# Gotanda \n\nGotanda is OSINT(Open Source Intelligence) Web Extension for Firefox/Chrome.\n\nThis Web Extension could searc"
},
{
"path": "background.js",
"chars": 22295,
"preview": "// create Whois context menus\r\nchrome.contextMenus.create({\r\n \"id\": \"whois\",\r\n \"title\": \"whois\",\r\n \"contexts\":["
},
{
"path": "manifest.json",
"chars": 347,
"preview": "{\r\n \"manifest_version\": 2,\r\n \"name\": \"Gotanda\",\r\n \"description\": \"OSINT addon\",\r\n \"version\": \"1.8.2\",\r\n \""
}
]
About this extraction
This page contains the full source code of the HASH1da1/Gotanda GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 5 files (25.6 KB), approximately 7.0k tokens, and a symbol index with 1 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.