Skip to content
OSINT Threat Intel Interface - CLI for HoneyDB
Python Shell
Branch: master
Clone or download
Latest commit 3f91d7e Feb 12, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
LICENSE
README.md Update README.md Aug 31, 2017
mimir.py Update mimir.py Feb 12, 2019
rebuild.sh Update rebuild.sh May 10, 2017
requirements.txt

README.md

Mimir

OSINT Threat Intel Interface - Named after the old Norse God of knowledge.

Mimir functions as a CLI to HoneyDB which in short is an OSINT aggregative threat intel pool. Starting the program brings you to a menu the options for which are as follows.

1. Fetch Threat Feed        5. Visualize Top Malicious Hosts in Browser
2. Fetch Bad Host List      6. Visualize Top Targeted Services in Browser
3. Perform WHOIS Lookup     7. Visualize Results for Single Host in Browser
4. Invoke Nmap Scan         8. Quit

The purpose of this tool is to make intelligence gathering easier by including functionality to save the Threat Feed and Bad Host lists, and invoke either an in-script WHOIS lookup or Nmap scan to learn more about the target hosts. Logs are saved in the current working directory for future reference and further processing.

HoneyDB provides a data visualization service, this can be accessed via Mimir by selecting their respective options. Selenium will then employ the Geckodriver to open the pages.

Dependencies

pycurl
selenium 
blessings
ipwhois

Nmap and the Mozilla Geckodriver

To install the Python2.7 modules Mimir depends on please feel free to use the requirements file i have made for this project like so.

pip install -r requirements.txt

Update

Some versions of PyCurl work better with some versions of SSL than others. This is important because HoneyDB makes use of OpenSSL and having a version that does not support it makes Mimir incompatible with HoneyDB. To that end I have added some logic that lets Mimir detect your version of PyCurl and automatically rebuild it from source to a version that does support OpenSSL. It does so by invoking the rebuild.sh shell script that is included in this repo.

You can’t perform that action at this time.