# mitaka: extract, refang and search/scan IoC! ## TL;DR - [mitaka](https://github.com/ninoseki/mitaka) is a Chrome extension which can: - Extract & refang IoC from a block of text - e.g. `example[.]com` to `example.com` - Search / scan it on various engines - e.g. VirusTotal, urlscan.io, Censys, Shodan, etc. --- IoCs(Indicator of Compromise) in reports on the Internet are *defanged* most of time for preventing unintended click. - e.g. - `1.1.1[.]1` - `hxxps://google.com` - `test[at]example.com` It's a good manner. But reverting defang (a.k.a *refang*) is a tiresome task. - e.g. - `1.1.1[.]1` to `1.1.1.1` - `hxxps://google.com` to `https://google.com` - `test[at]example.com` to `test@example.com` How would be great if you can automatically extract & refang IoC from a block of text and search/scan it on VirusTotal or urlscan.io, etc.? Here is a solution. - [mitaka](https://github.com/ninoseki/mitaka) It works as a Chrome extension. It automatically extracts & refanges IoC from a selected text and shows context menus of search/scan engines. Search/scan engines are automatically selected based on a type of IoC. ![](https://i.imgur.com/47nppqf.gif) Ambiguous selection also works. ![](https://i.imgur.com/Dskzs6b.gif) It isn't nice? Try it! - https://chrome.google.com/webstore/detail/mitaka/bfjbejmeoibbdpfdbmbacmefcbannnbg ## Appendix: Alternatives / Simialr tools - [CrowdScrape](https://chrome.google.com/webstore/detail/crowdscrape/jjplaeklnlddpkbbdbnogmppffokemej) - [ThreatConnect Integrated Chrome Extension](https://chrome.google.com/webstore/detail/threatconnect-integrated/lblgcphpihpadjdpjgjnnoikjdjcnkbh) - [ThreatPinch Lookup](https://github.com/cloudtracer/ThreatPinchLookup) - [VTchromizer](https://chrome.google.com/webstore/detail/vtchromizer/efbjojhplkelaegfbieplglfidafgoka) - [Sputnik](https://github.com/mitchmoser/sputnik)