Simple security lookups via CLI
Project description
seclook
seclook
is a security lookup CLI tool that allows you to query various security services on the fly. It is essentially a wrapper over the requests
library that removes the need to manually search within Web UIs or write your own requests in Postman or cURL to query these services.
You can look up information using commands like seclook [service] [value]
, where the service can be virustotal
, shodan
, emailrep
, and so on. The value is the information you're querying for and varies by service.
Installation
pip install seclook
- Copy config.ini.sample from this directory and place it in
~/.seclook/config.ini
- Open
~/.seclook/config.ini
and add in your own API keys for the services you want to use.
Some services (e.g., GreyNoise, ThreatFox) don't require API keys, but may be rate-limited more quickly without one or have other limitations.
Usage
Basic usage of seclook
is as follows:
seclook [service] [value]
For example, to look up IP 1.1.1.1 on VirusTotal, you'd run:
seclook virustotal 1.1.1.1
You can pipe the output to jq
or fx
for further processing:
seclook virustotal 1.1.1.1 | jq
You can grep
the output for known keys to get specific information:
seclook virustotal 1.1.1.1 | grep malicious
Options
--export
– Use this flag to export the results to a JSON file on your Desktop.
Supported services
You can also view supported services by passing list
as the service name:
seclook list
Upgrading
To upgrade seclook to the latest version:
pip install --upgrade seclook
Contributing
If you'd like to contribute to seclook, please feel free to fork the repository, create a feature branch, and then submit a Pull Request.
License
MIT License
Contact
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.