The Valkyrie Python Project
Project description
Valkyrie
Valkyrie is a robust set of CLI tools written in Python, designed for intricate web analysis. Delve into URLs, network traffic, and more with the might of Valkyrie.
Core Scripts & Implementations
-
valkyrie: The command center. Overview and configuration.
- Implementation: Standard Python libraries.
-
curls: Fetch URL details.
- Implementation: Use
requests
orhttp.client
.
- Implementation: Use
-
digs: Extract DNS records.
- Implementation: Utilize
dnspython
.
- Implementation: Utilize
-
whobe: Domain ownership details.
- Implementation: Use
python-whois
.
- Implementation: Use
-
ipcheck: Fetch IP details.
- Implementation: Leverage
ipwhois
or APIs like ipinfo.io.
- Implementation: Leverage
-
torcheck: Check if IP is from the Tor network.
- Implementation: Query publicly available Tor exit node lists.
-
virustotal: Scan URLs/IPs with VirusTotal.
- Implementation: Interface with the VirusTotal API using
requests
.
- Implementation: Interface with the VirusTotal API using
-
urlscan: Deep URL analysis.
- Implementation: Use Python's
urllib
.
- Implementation: Use Python's
-
heimdall: Real-time network traffic monitor.
- Implementation: Use
pcapy
orpyshark
.
- Implementation: Use
-
mjolnir: Pinger for latency and uptime.
- Implementation: Utilize
ping3
.
- Implementation: Utilize
-
odinseye: Deep packet inspection.
- Implementation: Leverage
pyshark
.
- Implementation: Leverage
-
frostbite: Detect DDoS patterns.
- Implementation: Use
socket
andscapy
for traffic analysis.
- Implementation: Use
-
runepeek: Decode obfuscated URLs.
- Implementation: Use
urllib.parse
for URL decoding.
- Implementation: Use
-
bifrost: Trace data packet paths.
- Implementation: Implement traceroute functionality with
scapy
.
- Implementation: Implement traceroute functionality with
-
yggdrasil: Network topology visualization.
- Implementation: Map networks with
networkx
, visualizing in CLI tables or ASCII.
- Implementation: Map networks with
-
lokihide: Detect steganography.
- Implementation: Use
stegano
.
- Implementation: Use
-
freyasight: Vulnerability scanner.
- Implementation: Interface with NVD or similar databases using
requests
.
- Implementation: Interface with NVD or similar databases using
-
valhallacall: Automated alerting system.
- Implementation: Use
smtplib
for email alerts or APIs of messaging platforms.
- Implementation: Use
To use Valkyrie's toolkit, ensure you have Python3 installed, and install the necessary packages using pip. For example:
pip install requests dnspython python-whois ipwhois pcapy pyshark ping3 scapy networkx stegano
Dive deep into web analysis with the precision and agility of Valkyrie.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for valkyrie_tools-0.1.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | e0cf9b2191a93151f0437ac6e05909a423a4b3a7420589826d21d76c4fff1762 |
|
MD5 | c6bcfe8ab88a27d1eacdc1ad1246c4f8 |
|
BLAKE2b-256 | d14d941708d5edce229c7c3a98c4ac3b5d866a9c494c2d83ab3435d2d5506d01 |