Open In App

Automater – IP and URL OSINT Tool For Analysis

Last Updated : 17 Oct, 2021
Improve
Improve
Like Article
Like
Save
Share
Report

OSINT processes on the IP addresses and Domains are be performed using automated tools. Automater is a fully automated tool that can perform OSINT search on IP addresses, MD5 Hash, and also Domain Addresses. 

Automater tool returns the relevant results from trusted sources which are IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me, Urlvoid.com, Labs.alienvault.com, ThreatExpert, VxVault, and VirusTotal. Automater tool is developed in the Python Language and available on the GitHub platform. As it’s available on GitHub, it’s free and open-source to use.

Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux

Installation of Automater Tool on Kali Linux OS

Step 1:  Use the following command to install the tool in your Kali Linux operating system.

git clone https://github.com/1aN0rmus/TekDefense-Automater.git

Automater – IP & URL OSINT Tool For Analysis

Step 2:  Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.

cd TekDefense-Automater

Automater – IP & URL OSINT Tool For Analysis

Step 3: Now you are in the directory of the tool. Use the following command to run the tool.

./Automater.py -h

Automater – IP & URL OSINT Tool For Analysis

Working with Automater Tool on Kali Linux OS

Example 1: Scanning MD5 Hash

./Automater.py 0978D1D116B57F00BBBE31E2A6861947

In this example, we are getting the information about the MD5 hash which is provided as an input.

Automater – IP & URL OSINT Tool For Analysis

We have got the results of our scan.

Automater – IP & URL OSINT Tool For Analysis

Example 2: Scanning Domain Address

./Automater.py geeksforgeeks.org

In this example, we are scanning the domain address geeksforgeeks.org.

Automater – IP & URL OSINT Tool For Analysis

Results are displayed in the below screenshot.

Example 3: Scanning IP Address

./Automater.py 192.168.144.130

In this example, we are scanning the IP address 192.168.144.130.

Automater – IP & URL OSINT Tool For Analysis

We have got the results.

Automater – IP & URL OSINT Tool For Analysis

Example 4: This option will output the results to a file

./Automater.py 192.168.144.130 -o results.txt

Automater – IP & URL OSINT Tool For Analysis

Results are saved in .txt formatted file.

Example 5: This option will output the results to an HTML file

./Automater.py 192.168.144.130 -w results.html

Automater – IP & URL OSINT Tool For Analysis

Results are saved and displayed from the .html formatted file.

Automater – IP & URL OSINT Tool For Analysis

Example 6: This option will output the results to a CSV file

./Automater.py 192.168.144.130 -c results.csv

Automater – IP & URL OSINT Tool For Analysis

Results are saved and displayed from .csvformatted file.

Automater – IP & URL OSINT Tool For Analysis

Example 7: This will change the delay to the inputted seconds

./Automater.py 192.168.144.130 -d 3

Example 8: This option will only run the target against a specific source engine to pull associated domains. Options are defined in the name attribute of the site element in the XML configuration file. This can be a list of names separated by a semicolon.

./Automater.py 192.168.144.130 –source robtex,vtpDNSIP,ipvoid

Automater – IP & URL OSINT Tool For Analysis

We have displayed the output by selecting only the specified sources.

Automater – IP & URL OSINT Tool For Analysis

Example 9: This option will set a proxy to use

./Automater.py 192.168.144.130 -p/proxy 127.0.0.1

Automater – IP & URL OSINT Tool For Analysis



Like Article
Suggest improvement
Share your thoughts in the comments

Similar Reads