This is the Windows app named Mitaka whose latest release can be downloaded as v2.7.0sourcecode.zip. It can be run online in the free hosting provider OnWorks for workstations.
Download and run online this app named Mitaka with OnWorks for free.
Follow these instructions in order to run this app:
- 1. Downloaded this application in your PC.
- 2. Enter in our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.
- 3. Upload this application in such filemanager.
- 4. Start any OS OnWorks online emulator from this website, but better Windows online emulator.
- 5. From the OnWorks Windows OS you have just started, goto our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.
- 6. Download the application and install it.
- 7. Download Wine from your Linux distributions software repositories. Once installed, you can then double-click the app to run them with Wine. You can also try PlayOnLinux, a fancy interface over Wine that will help you install popular Windows programs and games.
Wine is a way to run Windows software on Linux, but with no Windows required. Wine is an open-source Windows compatibility layer that can run Windows programs directly on any Linux desktop. Essentially, Wine is trying to re-implement enough of Windows from scratch so that it can run all those Windows applications without actually needing Windows.
SCREENSHOTS:
Mitaka
DESCRIPTION:
Mitaka is a browser extension designed to streamline Open Source Intelligence (OSINT) investigations by enabling quick searches and scans directly from the browser. It allows security researchers, analysts, and investigators to easily examine various indicators of compromise (IoCs) such as IP addresses, domains, URLs, hashes, email addresses, and more. Instead of manually copying and pasting suspicious indicators into multiple intelligence platforms, users can simply highlight a value on any webpage and access multiple OSINT services through a context menu. Mitaka automatically detects the type of indicator and generates appropriate search options for relevant threat intelligence services. Mitaka also includes a refanging capability that converts obfuscated indicators, such as example[.]com or hxxp://example.com, into valid formats that can be analyzed immediately.
Features
- Detects and analyzes indicators of compromise such as IPs, domains, hashes, URLs, and email addresses
- Provides quick OSINT searches through a browser right-click context menu
- Automatically refangs obfuscated indicators like example[.]com or hxxp URLs
- Integrates with dozens of security and intelligence services such as VirusTotal, Shodan, and Censys
- Supports investigation of multiple indicator types including CVE numbers and cryptocurrency addresses
- Enables fast threat intelligence lookup without leaving the current webpage
Programming Language
TypeScript
Categories
This is an application that can also be fetched from https://sourceforge.net/projects/mitaka.mirror/. It has been hosted in OnWorks in order to be run online in an easiest way from one of our free Operative Systems.