Automater – IP and URL OSINT Tool For Analysis
Last Updated :
17 Oct, 2021
OSINT processes on the IP addresses and Domains are be performed using automated tools. Automater is a fully automated tool that can perform OSINT search on IP addresses, MD5 Hash, and also Domain Addresses.
Automater tool returns the relevant results from trusted sources which are IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me, Urlvoid.com, Labs.alienvault.com, ThreatExpert, VxVault, and VirusTotal. Automater tool is developed in the Python Language and available on the GitHub platform. As it’s available on GitHub, it’s free and open-source to use.
Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux
Installation of Automater Tool on Kali Linux OS
Step 1: Use the following command to install the tool in your Kali Linux operating system.
git clone https://github.com/1aN0rmus/TekDefense-Automater.git
Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.
cd TekDefense-Automater
Step 3: Now you are in the directory of the tool. Use the following command to run the tool.
./Automater.py -h
Working with Automater Tool on Kali Linux OS
Example 1: Scanning MD5 Hash
./Automater.py 0978D1D116B57F00BBBE31E2A6861947
In this example, we are getting the information about the MD5 hash which is provided as an input.
We have got the results of our scan.
Example 2: Scanning Domain Address
./Automater.py geeksforgeeks.org
In this example, we are scanning the domain address geeksforgeeks.org.
Results are displayed in the below screenshot.
Example 3: Scanning IP Address
./Automater.py 192.168.144.130
In this example, we are scanning the IP address 192.168.144.130.
We have got the results.
Example 4: This option will output the results to a file
./Automater.py 192.168.144.130 -o results.txt
Results are saved in .txt formatted file.
Example 5: This option will output the results to an HTML file
./Automater.py 192.168.144.130 -w results.html
Results are saved and displayed from the .html formatted file.
Example 6: This option will output the results to a CSV file
./Automater.py 192.168.144.130 -c results.csv
Results are saved and displayed from .csvformatted file.
Example 7: This will change the delay to the inputted seconds
./Automater.py 192.168.144.130 -d 3
Example 8: This option will only run the target against a specific source engine to pull associated domains. Options are defined in the name attribute of the site element in the XML configuration file. This can be a list of names separated by a semicolon.
./Automater.py 192.168.144.130 –source robtex,vtpDNSIP,ipvoid
We have displayed the output by selecting only the specified sources.
Example 9: This option will set a proxy to use
./Automater.py 192.168.144.130 -p/proxy 127.0.0.1
Share your thoughts in the comments
Please Login to comment...