Skip to main content

Valkyrie Tools

Project description

Valkyrie Tools

A collection of tools and scripts for making the life of security analysts easier, faster, and more efficient.


[Tests][tests] [Codecov][codecov] [PyPI][pypi_] [Python Version][python version]

Python Black [Read the documentation at https://valkyrie-tools.readthedocs.io/][read the docs] Downloads License

Installation

Install valkyrie-tools from the Python Package Index:

$ pip install valkyrie-tools

or

$ python3 -m pip install valkyrie-tools

Requirements

  • Python 3.8+

Usage

All of the command line tools are available under directly and should be available in your path after installation.

$ valkyrie

All commands were built with the intention of being used in a CI/CD pipeline. As such, they all have a --help flag that will print out the available options.

$ valkyrie --help

Command Line Scripts

A list of all available command line scripts:

Once you've installed the package, you can run any of the scripts like so:

$ <script-name> <args>

Valkyrie

This script has not yet been implemented.

URLCheck

This script will check the aliveness of a URL and follow any redirects.

Arguments:

$ urlcheck <url>

Example Usage:

$ urlcheck "https://google.com"
-> https://google.com
   HTTP/1.1 - 301 - Moved Permanently
>> https://www.google.com/
   HTTP/1.1 - 200 - OK

IPCheck

This script will get information for an IP address.

Arguments:

$ ipcheck <ip>

Example Usage:

$ ipcheck 1.1.1.1
> 1.1.1.1
  ip       : 1.1.1.1
  hostname : one.one.one.one
  anycast  : True
  city     : Los Angeles
  region   : California
  country  : US
  loc      : 34.0522,-118.2437
  org      : AS13335 Cloudflare, Inc.
  postal   : 90076
  timezone : America/Los_Angeles
  readme   : https://ipinfo.io/missingauth

WhoBe

This script will get information for a domain or IP address.

Arguments:

$ whobe <domain/ip>

Example Usage:

$ whobe google.com
> google.com
   Registrar: MarkMonitor Inc. (None)
   Emails:
      - abusecomplaints@markmonitor.com
   Name: None
   Address: None, None, None None, None
   Creation Date: 1997-09-15 04:00:00
   Expiration Date: 2028-09-14 04:00:00
   Updated Date: 2019-09-09 15:39:04
   Name Servers:
      - NS1.GOOGLE.COM
      - NS2.GOOGLE.COM
      - NS3.GOOGLE.COM
      - NS4.GOOGLE.COM
$
$ whobe 1.1.1.1
> 1.1.1.1
   ASN: 13335 (AU)
   CIDR: 1.1.1.0/24
   Description: 1.1.1.0/24
   Networks:
      - APNIC-LABS (AA1412-AP)
        CIDR: 1.1.1.0/24
        Netrange: (1.1.1.0 - 1.1.1.255) - 24 Hosts
        Address: PO Box 3646 South Brisbane, QLD 4101 Australia, AU
        Emails:
          - resolver-abuse@cloudflare.com
          - helpdesk@apnic.net
          - research@apnic.net

Contributing

Contributions are very welcome. To learn more, see the Contributor Guide.

License

Distributed under the terms of the MIT license, valkyrie-tools is free and open source software.

Issues

If you encounter any problems, please file an issue along with a detailed description.

Credits

This project was built off of the sweat and tears of the the bad actors it was built to fight.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

valkyrie_tools-1.0.2.tar.gz (21.5 kB view hashes)

Uploaded Source

Built Distribution

valkyrie_tools-1.0.2-py3-none-any.whl (23.9 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page