# mitaka: extract, refang and search/scan IoC!
## TL;DR
- [mitaka](https://github.com/ninoseki/mitaka) is a Chrome extension which can:
- Extract & refang IoC from a block of text
- e.g. `example[.]com` to `example.com`
- Search / scan it on various engines
- e.g. VirusTotal, urlscan.io, Censys, Shodan, etc.
---
IoCs(Indicator of Compromise) in reports on the Internet are *defanged* most of time for preventing unintended click.
- e.g.
- `1.1.1[.]1`
- `hxxps://google.com`
- `test[at]example.com`
It's a good manner. But reverting defang (a.k.a *refang*) is a tiresome task.
- e.g.
- `1.1.1[.]1` to `1.1.1.1`
- `hxxps://google.com` to `https://google.com`
- `test[at]example.com` to `test@example.com`
How would be great if you can automatically extract & refang IoC from a block of text and search/scan it on VirusTotal or urlscan.io, etc.?
Here is a solution.
- [mitaka](https://github.com/ninoseki/mitaka)
It works as a Chrome extension. It automatically extracts & refanges IoC from a selected text and shows context menus of search/scan engines. Search/scan engines are automatically selected based on a type of IoC.
![](https://i.imgur.com/47nppqf.gif)
Ambiguous selection also works.
![](https://i.imgur.com/Dskzs6b.gif)
It isn't nice? Try it!
- https://chrome.google.com/webstore/detail/mitaka/bfjbejmeoibbdpfdbmbacmefcbannnbg
## Appendix: Alternatives / Simialr tools
- [CrowdScrape](https://chrome.google.com/webstore/detail/crowdscrape/jjplaeklnlddpkbbdbnogmppffokemej)
- [ThreatConnect Integrated Chrome Extension](https://chrome.google.com/webstore/detail/threatconnect-integrated/lblgcphpihpadjdpjgjnnoikjdjcnkbh)
- [ThreatPinch Lookup](https://github.com/cloudtracer/ThreatPinchLookup)
- [VTchromizer](https://chrome.google.com/webstore/detail/vtchromizer/efbjojhplkelaegfbieplglfidafgoka)
- [Sputnik](https://github.com/mitchmoser/sputnik)