Welcome to the AI OSINT Security Analyzer! This project leverages cutting-edge AI technology to enhance cybersecurity intelligence. Our Streamlit web app utilizes Cohere's Command A model, combined with powerful data sources like Shodan, VirusTotal, AbuseIPDB, and CVE databases. Together, these tools provide a comprehensive threat assessment for websites, CVEs, IP addresses, and software.
- Comprehensive Threat Assessment: Analyze websites, IP addresses, and software vulnerabilities.
- AI-Driven Insights: Utilize Cohere's Command A model for enhanced analysis.
- Multi-Source Data Gathering: Integrate information from Shodan, VirusTotal, AbuseIPDB, and CVE databases.
- User-Friendly Interface: Built with Streamlit for a seamless user experience.
- Open Source: Contribute to the project and improve its capabilities.
- Python: The primary programming language for development.
- Streamlit: Framework for building the web app.
- Cohere's Command A: AI model for natural language processing and analysis.
- Shodan: Search engine for Internet-connected devices.
- VirusTotal: Service that analyzes files and URLs for viruses and other malware.
- AbuseIPDB: Database for reporting and checking IP addresses involved in abusive behavior.
- CVE Databases: Sources for information on known vulnerabilities.
To get started with the AI OSINT Security Analyzer, follow these steps:
-
Clone the Repository:
git clone https://github.com/Armaan29-09-2005/AI-OSINT-Security-Analyzer.git cd AI-OSINT-Security-Analyzer -
Install Required Packages: Ensure you have Python 3.8 or higher installed. Use pip to install the necessary libraries:
pip install -r requirements.txt
-
Run the Application: Launch the Streamlit app with the following command:
streamlit run app.py
Once the application is running, you can access it via your web browser at http://localhost:8501. The interface is designed to be intuitive. Hereβs how to use it:
- Input Section: Enter the website URL, IP address, or CVE ID you want to analyze.
- Select Data Sources: Choose which data sources you want to query for your analysis.
- Run Analysis: Click the "Analyze" button to begin the assessment.
- View Results: Review the comprehensive threat assessment provided by the app.
For downloadable releases, please visit Releases to get the latest version of the application.
We welcome contributions from the community! To contribute to the AI OSINT Security Analyzer, please follow these steps:
- Fork the Repository: Click on the "Fork" button at the top right of the page.
- Create a New Branch:
git checkout -b feature/YourFeatureName
- Make Your Changes: Implement your feature or fix.
- Commit Your Changes:
git commit -m "Add Your Feature Description" - Push to Your Fork:
git push origin feature/YourFeatureName
- Create a Pull Request: Go to the original repository and submit your pull request.
This project is licensed under the MIT License. See the LICENSE file for details.
For any inquiries or suggestions, please reach out to the project maintainer:
- Armaan: GitHub Profile
We acknowledge the developers of the libraries and tools that made this project possible:
- Cohere for their AI models.
- Shodan, VirusTotal, AbuseIPDB, and CVE for their valuable data sources.
For downloadable releases, please visit Releases to get the latest version of the application.
This README provides a comprehensive overview of the AI OSINT Security Analyzer project. It outlines the features, technologies, installation steps, usage instructions, contribution guidelines, and contact information. With this information, users and contributors can easily understand and engage with the project.