Skip to content

Welcome to ThreatInsight, your all-in-one cyber defense platform. With ThreatInsight, you gain access to a comprehensive web application that centralizes multiple cybersecurity tools and services, offering unparalleled convenience in gathering information about your targets.

Notifications You must be signed in to change notification settings

neratmatevz/ThreatInsight

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ThreatInsight

Welcome to ThreatInsight, your all-in-one cyber defense platform. With ThreatInsight, you gain access to a comprehensive web application that centralizes multiple cybersecurity tools and services, offering unparalleled convenience in gathering information about your targets.

Whether you're scrutinizing tech giants like Google, academic institutions such as UM, or specific companies, ThreatInsight equips you with intuitive tools to efficiently collect, analyze, and store pertinent data. Receive tailored insights and advice on the state of your targets, along with proactive suggestions to address potential vulnerabilities.

Cybersecurity Tools

Tools

The application offers the following tools:

  • nmap: Scans the network status of the target – hosts, host statuses, port statuses, OS, etc.
  • WhoIs: Retrieves domain/IP data – creation date, name servers, registrar, etc.
  • HaveIBeenPwned: Checks if the target's data has been exposed in any breaches and identifies which breaches.
  • IpGeolocation: Provides an approximate location of the target based on the IP address.
  • TLS/DNSSec scan: Provides TLS information and DNSSec activation status.
  • E-mail verifier: Verifies the existence of emails or searches for emails based on a domain or full address.
  • E-mail permutator: Generates possible phishing email accounts based on given guidelines.

Built With

This section lists the major frameworks and libraries used to build and bootstrap this project.

  • Node.js
  • React
  • React Bootstrap
  • Firebase

Setup Instructions

1. Clone the repo

git clone https://github.com/your_username_/ThreatInsight.git

For detailed setup instructions, refer to the specific README files for the frontend and backend.

2. Backend

For backend setup, including environment variables and API configurations, see the Backend README.

3. Frontend

For frontend setup, including environment variables and Firebase configuration, see the Frontend README.

About

Welcome to ThreatInsight, your all-in-one cyber defense platform. With ThreatInsight, you gain access to a comprehensive web application that centralizes multiple cybersecurity tools and services, offering unparalleled convenience in gathering information about your targets.

Topics

Resources

Stars

Watchers

Forks