Valkyrie Tools
Project description
Valkyrie Tools
A collection of tools and scripts for making the life of security analysts easier, faster, and more efficient.
[][tests] [][codecov] [][pypi_] [][python version]
Installation
Install valkyrie-tools
from the Python Package Index:
$ pip install valkyrie-tools
or
$ python3 -m pip install valkyrie-tools
Requirements
- Python 3.8+
Usage
All of the command line tools are available under directly and should be available in your path after installation.
$ valkyrie
All commands were built with the intention of being used in a CI/CD pipeline.
As such, they all have a --help
flag that will print out the available
options.
$ valkyrie --help
Command Line Scripts
A list of all available command line scripts:
Once you've installed the package, you can run any of the scripts like so:
$ <script-name> <args>
Valkyrie
This script has not yet been implemented.
URLCheck
This script will check the aliveness of a URL and follow any redirects.
Arguments:
$ urlcheck <url>
Example Usage:
$ urlcheck "https://google.com"
-> https://google.com
HTTP/1.1 - 301 - Moved Permanently
>> https://www.google.com/
HTTP/1.1 - 200 - OK
IPCheck
This script will get information for an IP address.
Arguments:
$ ipcheck <ip>
Example Usage:
$ ipcheck 1.1.1.1
> 1.1.1.1
ip : 1.1.1.1
hostname : one.one.one.one
anycast : True
city : Los Angeles
region : California
country : US
loc : 34.0522,-118.2437
org : AS13335 Cloudflare, Inc.
postal : 90076
timezone : America/Los_Angeles
readme : https://ipinfo.io/missingauth
WhoBe
This script will get information for a domain or IP address.
Arguments:
$ whobe <domain/ip>
Example Usage:
$ whobe google.com
> google.com
Registrar: MarkMonitor Inc. (None)
Emails:
- abusecomplaints@markmonitor.com
Name: None
Address: None, None, None None, None
Creation Date: 1997-09-15 04:00:00
Expiration Date: 2028-09-14 04:00:00
Updated Date: 2019-09-09 15:39:04
Name Servers:
- NS1.GOOGLE.COM
- NS2.GOOGLE.COM
- NS3.GOOGLE.COM
- NS4.GOOGLE.COM
$
$ whobe 1.1.1.1
> 1.1.1.1
ASN: 13335 (AU)
CIDR: 1.1.1.0/24
Description: 1.1.1.0/24
Networks:
- APNIC-LABS (AA1412-AP)
CIDR: 1.1.1.0/24
Netrange: (1.1.1.0 - 1.1.1.255) - 24 Hosts
Address: PO Box 3646 South Brisbane, QLD 4101 Australia, AU
Emails:
- resolver-abuse@cloudflare.com
- helpdesk@apnic.net
- research@apnic.net
Contributing
Contributions are very welcome. To learn more, see the Contributor Guide.
License
Distributed under the terms of the MIT license, valkyrie-tools is free and open source software.
Issues
If you encounter any problems, please file an issue along with a detailed description.
Credits
This project was built off of the sweat and tears of the the bad actors it was built to fight.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for valkyrie_tools-1.0.2-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 9a4db75b20e1a079d59d1ea6c9db07363acbdbeb3677dbfcd5901cd82cbfe004 |
|
MD5 | f3633abb609cf3d1f4adedb5a9df6bc8 |
|
BLAKE2b-256 | 4cb73bfd0dc11db6943895c005baee5952ce8bd81e48dc568398ee370ce1a408 |