chiasmodon


Namechiasmodon JSON
Version 2.0.1 PyPI version JSON
download
home_pagehttps://github.com/chiasmod0n/chiasmodon
SummaryChiasmodon is an OSINT tool that allows users to gather information from various sources and conduct targeted searches based on domains, Google Play applications, email addresses, IP addresses, organizations, URLs, and more. It provides comprehensive scanning capabilities, customizable output formats, and additional options for enhanced data analysis and customization.
upload_time2024-04-30 19:28:51
maintainerNone
docs_urlNone
authorchiasmod0n
requires_pythonNone
licenseNone
keywords intelligence osint credentials emails asn cidr bugbounty subdomains information-gathering intelligence-analysis reconnaissance attack-surface subdomain-enumeration reconnaissance-framework bugbounty-tool email-enumeration chiasmodon
VCS
bugtrack_url
requirements tldextract yaspin argcomplete requests
Travis-CI No Travis.
coveralls test coverage No coveralls.
            
# Chiasmodon

[![asciicast](https://asciinema.org/a/QrEtBLFMQrjU1sjRjcgTdo41m.svg)](https://asciinema.org/a/QrEtBLFMQrjU1sjRjcgTdo41m)
<p align="center">
<img src="https://badge.fury.io/py/chiasmodon.svg" />
</p>
Chiasmodon is an OSINT tool that allows users to gather information from various sources and conduct targeted searches based on domains, Google Play applications, email addresses, IP addresses, organizations, URLs, and more. It provides comprehensive scanning capabilities, customizable output formats, and additional options for enhanced data analysis and customization.


## ✨Features

- [x] **🌐Domain**: Conduct targeted searches by specifying a domain name to gather relevant information related to the domain.
- [x] **🎮Google Play Application**: Search for information related to a specific application on the Google Play Store by providing the application ID.
- [x] **✉️Email, 👤Username, 🔒Password**: Conduct searches based on email, username, or password to identify potential security risks or compromised credentials.
- [x] **🔍 IP Address**: Perform searches using an IP address to gather information such as geolocation, associated domain names, and historical data.
- [x] **🌍 CIDR**: Search for information related to a specified CIDR (Classless Inter-Domain Routing) block, including IP range details and associated networks.
- [x] **🔢 ASN**: Retrieve information about an Autonomous System Number (ASN), including its owner, associated IP ranges, and network details.
- [x] **🔌 Port**: Search for information about a specific port number, including its common usage, associated services, and potential vulnerabilities.
- [x] **🌐 ISP**: Conduct searches based on an Internet Service Provider (ISP) name to gather information about the ISP, its services, and associated IP ranges.
- [x] **🏢 Organization (ORG)**: Search for information related to a specific organization or company, including its contact details, associated domains, and network infrastructure.
- [x] **🔗 URL Path**: Perform searches based on a specific URL path to gather information about the path, its content, and potential security risks.
- [x] **📞 Phone**: Conduct searches using a phone number to gather information such as the associated owner, location, and any available public records.
- [x] **🔍Scan**: Perform a comprehensive scan on a given company domain name in one click, including finding
  - Related companies.
  - App applications.
  - Ips (`Port, Org, Isp, Asn`).
  - Subdomains.
  - Client credentials (`Email, Username, Password`).
  - Employee credentials (`Email, Username, Password`)
  - URLs (`Domain/IP, Port, Endpoint`)

- [X] **🌍Country**: Sort and filter search results by country to gain insights into the geographic distribution of the identified information.
- [x] **📋Output Customization**: Choose the desired output format (text, JSON, or CSV) and specify the filename to save the search results.
- [x] **⚙️Additional Options**: The tool offers various additional options, such as viewing different result types (credentials, URLs, subdomains, emails, passwords, usernames, or applications), setting API tokens, specifying timeouts, limiting results, and more.

## 🚀Comming soon

- **🏢Company Name**: We understand the importance of comprehensive company research. In our upcoming release, you'll be able to search by company name and access a wide range of documents associated with that company. This feature will provide you with a convenient and efficient way to gather crucial information, such as legal documents, financial reports, and other relevant records.

- **👤Face (Photo)**: Visual data is a powerful tool, and we are excited to introduce our advanced facial recognition feature. With "Search by Face (Photo)," you can upload an image containing a face and leverage cutting-edge technology to identify and match individuals across various data sources. This will allow you to gather valuable information, such as social media profiles, online presence, and potential connections, all through the power of facial recognition.

## Why Chiasmodon name ?
Chiasmodon niger is a species of deep sea fish in the family Chiasmodontidae. It is known for its ability to **swallow fish larger than itself**. and so do we. 😉
![Chiasmodon background](https://journal.voca.network/wp-content/uploads/2017/10/DTR083_1200.png)

## 🔑 Subscription
Join us today and unlock the potential of our cutting-edge OSINT tool. Contact https://t.me/Chiasmod0n on Telegram to subscribe and start harnessing the power of Chiasmodon for your domain investigations.

## ⬇️Install
```bash
$ pip install chiasmodon
```
Only for linux 👇 
```bash
$ activate-global-python-argcomplete
```
## 💻Usage
Chiasmodon provides a flexible and user-friendly command-line interface and python library. Here are some examples to demonstrate its usage:


```
usage: chiasmodon_cli.py [-h]
                         [-m {cred.username,cred.password,cred.email,cred.phone,cred.email.domain,cred.country,domain,domain.all,ip,ip.asn,ip.isp,ip.org,ip.port,ip.country,app.id,app.name,app.domain,url.path,url.port}]
                         [-vt {full,cred,url,email,phone,password,username,app,domain,ip,related,subdomain}] [-s] [-sr SCAN_RELATED]
                         [-ss SCAN_SUBDOMAINS] [-sa SCAN_APPS] [-si SCAN_IPS] [-sc SCAN_CLIENTS] [-se SCAN_EMPLOYEES] [-o OUTPUT]
                         [-ot {text,json,csv}] [-t TIMEOUT] [-l LIMIT] [-nc] [-lv] [-lm] [--init INIT] [-v]
                         query

Chiasmodon CLI

positional arguments:
  query                 query argument

options:
  -h, --help            show this help message and exit
  -m {cred.username,cred.password,cred.email,cred.phone,cred.email.domain,cred.country,domain,domain.all,ip,ip.asn,ip.isp,ip.org,ip.port,ip.country,app.id,app.name,app.domain,url.path,url.port}, --method {cred.username,cred.password,cred.email,cred.phone,cred.email.domain,cred.country,domain,domain.all,ip,ip.asn,ip.isp,ip.org,ip.port,ip.country,app.id,app.name,app.domain,url.path,url.port}
                        method to search by it,default is "domain".
  -vt {full,cred,url,email,phone,password,username,app,domain,ip,related,subdomain}, --view-type {full,cred,url,email,phone,password,username,app,domain,ip,related,subdomain}
                        type view the result default is "full".
  -s, --scan            scan the company domain (Related company, Clients, Employees, Company ASNs, Company Apps).
  -sr SCAN_RELATED, --scan-related SCAN_RELATED
                        Run related scan, default is yes, Ex: -sr no
  -ss SCAN_SUBDOMAINS, --scan-subdomains SCAN_SUBDOMAINS
                        Run subdomains scan, default is yes, Ex: -ss no
  -sa SCAN_APPS, --scan-apps SCAN_APPS
                        Run App scan, default is yes, Ex: -sa no
  -si SCAN_IPS, --scan-ips SCAN_IPS
                        Run IPs scan, default is yes, Ex: -si no
  -sc SCAN_CLIENTS, --scan-clients SCAN_CLIENTS
                        Run clients scan, default is yes, Ex: -sc no
  -se SCAN_EMPLOYEES, --scan-employees SCAN_EMPLOYEES
                        Run employees scan, default is yes, Ex: -se no
  -o OUTPUT, --output OUTPUT
                        filename to save the result
  -ot {text,json,csv}, --output-type {text,json,csv}
                        output format default is "text".
  -t TIMEOUT, --timeout TIMEOUT
                        request timeout default is 360 sec.
  -l LIMIT, --limit LIMIT
                        limit results default is 10000.
  -nc, --no-color       show result without color.
  -lv, --list-view-type
                        list view type.
  -lm, --list-methods   list methods.
  --init INIT           set the api token.
  -v, --version         version.
```

Examples:
```
# Scan company by domain
chiasmodon_cli.py example.com --scan

# Search for target domain, you will see the result for only this "example.com" 
chiasmodon_cli.py example.com 
    
# Search in target and target subdomains
chiasmodon_cli.py example.com --method domain.all

# Search for target subdomains
chiasmodon_cli.py example.com --view-type subdomain
        
# Search for all creds in United States 
chiasmodon_cli.py US --method cred.country

# Search for related companies by domain
chiasmodon_cli.py example.com --view-type related

# search for target app id 
chiasmodon_cli.py com.discord --method app.id 
    
# search for target app domain 
chiasmodon_cli.py discord.com --method app.domain
    
# search for target app name 
chiasmodon_cli.py Discord --method app.name
    
# Search for ip asn
chiasmodon_cli.py AS123 --method ip.asn

# Search for cred username
chiasmodon_cli.py someone --method cred.username

# Search for cred password
chiasmodon_cli.py example@123 --method cred.password

# Search for url endpoint
chiasmodon_cli.py /wp-login.php --method url.path

# Search for ip
chiasmodon_cli.py 1.1.1.1 --method ip

# Search for cidr
chiasmodon_cli.py xx.xx.xx.0/24 --method ip

# Search for target creds by domain emsils
chiasmodon_cli.py example.com --method cred.email.domain

# Search for target email
chiasmodon_cli.py someone@example.com --method cred.email  

# search for multiple targets: 
chiasmodon_cli.py targets.txt --method domain  --output example-creds.txt 
```

Please note that these examples represent only a fraction of the available options and use cases. Refer to the documentation for more detailed instructions and explore the full range of features provided by Chiasmodon.


## 💬 Contributions and Feedback

Contributions and feedback are welcome! If you encounter any issues or have suggestions for improvements, please submit them to the Chiasmodon GitHub repository. Your input will help us enhance the tool and make it more effective for the OSINT community.

## 📜License

Chiasmodon is released under the [MIT License](https://opensource.org/licenses/MIT). See the [LICENSE](https://github.com/chiasmodon/LICENSE.txt) file for more details.

## ⚠️Disclaimer

Chiasmodon is intended for legal and authorized use only. Users are responsible for ensuring compliance with applicable laws and regulations when using the tool. The developers of Chiasmodon disclaim any responsibility for the misuse or illegal use of the tool.

## 📢Acknowledgments

Chiasmodon is the result of collaborative efforts from a dedicated team of contributors who believe in the power of OSINT. We would like to express our gratitude to the open-source community for their valuable contributions and support.

## 🔗Chiasmodon Links

- [🐍 Python Library](https://pypi.org/project/chiasmodon)
- [📱 Mobile (APK)](https://github.com/chiasmod0n/chiasmodon-mobile)
- [🌐 Website](https://chiasmodon.com)
- [💬 Telegram](https://t.me/chiasmod0n)
- [🐦 X/Twitter](https://x.com/chiasmod0n)


## ⭐️Star History

<a href="https://star-history.com/#chiasmod0n/chiasmodon&Date">
 <picture>
   <source media="(prefers-color-scheme: dark)" srcset="https://api.star-history.com/svg?repos=chiasmod0n/chiasmodon&type=Date&theme=dark" />
   <source media="(prefers-color-scheme: light)" srcset="https://api.star-history.com/svg?repos=chiasmod0n/chiasmodon&type=Date" />
   <img alt="Star History Chart" src="https://api.star-history.com/svg?repos=chiasmod0n/chiasmodon&type=Date" />
 </picture>
</a>


            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/chiasmod0n/chiasmodon",
    "name": "chiasmodon",
    "maintainer": null,
    "docs_url": null,
    "requires_python": null,
    "maintainer_email": null,
    "keywords": "intelligence osint credentials emails asn cidr bugbounty subdomains information-gathering intelligence-analysis reconnaissance attack-surface subdomain-enumeration reconnaissance-framework bugbounty-tool email-enumeration chiasmodon",
    "author": "chiasmod0n",
    "author_email": null,
    "download_url": "https://files.pythonhosted.org/packages/41/3a/50597c3c08dd1e885f309d942ade1b5f725f24dc210749dff17c25715b42/chiasmodon-2.0.1.tar.gz",
    "platform": null,
    "description": "\n# Chiasmodon\n\n[![asciicast](https://asciinema.org/a/QrEtBLFMQrjU1sjRjcgTdo41m.svg)](https://asciinema.org/a/QrEtBLFMQrjU1sjRjcgTdo41m)\n<p align=\"center\">\n<img src=\"https://badge.fury.io/py/chiasmodon.svg\" />\n</p>\nChiasmodon is an OSINT tool that allows users to gather information from various sources and conduct targeted searches based on domains, Google Play applications, email addresses, IP addresses, organizations, URLs, and more. It provides comprehensive scanning capabilities, customizable output formats, and additional options for enhanced data analysis and customization.\n\n\n## \u2728Features\n\n- [x] **\ud83c\udf10Domain**: Conduct targeted searches by specifying a domain name to gather relevant information related to the domain.\n- [x] **\ud83c\udfaeGoogle Play Application**: Search for information related to a specific application on the Google Play Store by providing the application ID.\n- [x] **\u2709\ufe0fEmail, \ud83d\udc64Username, \ud83d\udd12Password**: Conduct searches based on email, username, or password to identify potential security risks or compromised credentials.\n- [x] **\ud83d\udd0d IP Address**: Perform searches using an IP address to gather information such as geolocation, associated domain names, and historical data.\n- [x] **\ud83c\udf0d CIDR**: Search for information related to a specified CIDR (Classless Inter-Domain Routing) block, including IP range details and associated networks.\n- [x] **\ud83d\udd22 ASN**: Retrieve information about an Autonomous System Number (ASN), including its owner, associated IP ranges, and network details.\n- [x] **\ud83d\udd0c Port**: Search for information about a specific port number, including its common usage, associated services, and potential vulnerabilities.\n- [x] **\ud83c\udf10 ISP**: Conduct searches based on an Internet Service Provider (ISP) name to gather information about the ISP, its services, and associated IP ranges.\n- [x] **\ud83c\udfe2 Organization (ORG)**: Search for information related to a specific organization or company, including its contact details, associated domains, and network infrastructure.\n- [x] **\ud83d\udd17 URL Path**: Perform searches based on a specific URL path to gather information about the path, its content, and potential security risks.\n- [x] **\ud83d\udcde Phone**: Conduct searches using a phone number to gather information such as the associated owner, location, and any available public records.\n- [x] **\ud83d\udd0dScan**: Perform a comprehensive scan on a given company domain name in one click, including finding\n  - Related companies.\n  - App applications.\n  - Ips (`Port, Org, Isp, Asn`).\n  - Subdomains.\n  - Client credentials (`Email, Username, Password`).\n  - Employee credentials (`Email, Username, Password`)\n  - URLs (`Domain/IP, Port, Endpoint`)\n\n- [X] **\ud83c\udf0dCountry**: Sort and filter search results by country to gain insights into the geographic distribution of the identified information.\n- [x] **\ud83d\udccbOutput Customization**: Choose the desired output format (text, JSON, or CSV) and specify the filename to save the search results.\n- [x] **\u2699\ufe0fAdditional Options**: The tool offers various additional options, such as viewing different result types (credentials, URLs, subdomains, emails, passwords, usernames, or applications), setting API tokens, specifying timeouts, limiting results, and more.\n\n## \ud83d\ude80Comming soon\n\n- **\ud83c\udfe2Company Name**: We understand the importance of comprehensive company research. In our upcoming release, you'll be able to search by company name and access a wide range of documents associated with that company. This feature will provide you with a convenient and efficient way to gather crucial information, such as legal documents, financial reports, and other relevant records.\n\n- **\ud83d\udc64Face (Photo)**: Visual data is a powerful tool, and we are excited to introduce our advanced facial recognition feature. With \"Search by Face (Photo),\" you can upload an image containing a face and leverage cutting-edge technology to identify and match individuals across various data sources. This will allow you to gather valuable information, such as social media profiles, online presence, and potential connections, all through the power of facial recognition.\n\n## Why Chiasmodon name ?\nChiasmodon niger is a species of deep sea fish in the family Chiasmodontidae. It is known for its ability to **swallow fish larger than itself**. and so do we. \ud83d\ude09\n![Chiasmodon background](https://journal.voca.network/wp-content/uploads/2017/10/DTR083_1200.png)\n\n## \ud83d\udd11 Subscription\nJoin us today and unlock the potential of our cutting-edge OSINT tool. Contact https://t.me/Chiasmod0n on Telegram to subscribe and start harnessing the power of Chiasmodon for your domain investigations.\n\n## \u2b07\ufe0fInstall\n```bash\n$ pip install chiasmodon\n```\nOnly for linux \ud83d\udc47 \n```bash\n$ activate-global-python-argcomplete\n```\n## \ud83d\udcbbUsage\nChiasmodon provides a flexible and user-friendly command-line interface and python library. Here are some examples to demonstrate its usage:\n\n\n```\nusage: chiasmodon_cli.py [-h]\n                         [-m {cred.username,cred.password,cred.email,cred.phone,cred.email.domain,cred.country,domain,domain.all,ip,ip.asn,ip.isp,ip.org,ip.port,ip.country,app.id,app.name,app.domain,url.path,url.port}]\n                         [-vt {full,cred,url,email,phone,password,username,app,domain,ip,related,subdomain}] [-s] [-sr SCAN_RELATED]\n                         [-ss SCAN_SUBDOMAINS] [-sa SCAN_APPS] [-si SCAN_IPS] [-sc SCAN_CLIENTS] [-se SCAN_EMPLOYEES] [-o OUTPUT]\n                         [-ot {text,json,csv}] [-t TIMEOUT] [-l LIMIT] [-nc] [-lv] [-lm] [--init INIT] [-v]\n                         query\n\nChiasmodon CLI\n\npositional arguments:\n  query                 query argument\n\noptions:\n  -h, --help            show this help message and exit\n  -m {cred.username,cred.password,cred.email,cred.phone,cred.email.domain,cred.country,domain,domain.all,ip,ip.asn,ip.isp,ip.org,ip.port,ip.country,app.id,app.name,app.domain,url.path,url.port}, --method {cred.username,cred.password,cred.email,cred.phone,cred.email.domain,cred.country,domain,domain.all,ip,ip.asn,ip.isp,ip.org,ip.port,ip.country,app.id,app.name,app.domain,url.path,url.port}\n                        method to search by it,default is \"domain\".\n  -vt {full,cred,url,email,phone,password,username,app,domain,ip,related,subdomain}, --view-type {full,cred,url,email,phone,password,username,app,domain,ip,related,subdomain}\n                        type view the result default is \"full\".\n  -s, --scan            scan the company domain (Related company, Clients, Employees, Company ASNs, Company Apps).\n  -sr SCAN_RELATED, --scan-related SCAN_RELATED\n                        Run related scan, default is yes, Ex: -sr no\n  -ss SCAN_SUBDOMAINS, --scan-subdomains SCAN_SUBDOMAINS\n                        Run subdomains scan, default is yes, Ex: -ss no\n  -sa SCAN_APPS, --scan-apps SCAN_APPS\n                        Run App scan, default is yes, Ex: -sa no\n  -si SCAN_IPS, --scan-ips SCAN_IPS\n                        Run IPs scan, default is yes, Ex: -si no\n  -sc SCAN_CLIENTS, --scan-clients SCAN_CLIENTS\n                        Run clients scan, default is yes, Ex: -sc no\n  -se SCAN_EMPLOYEES, --scan-employees SCAN_EMPLOYEES\n                        Run employees scan, default is yes, Ex: -se no\n  -o OUTPUT, --output OUTPUT\n                        filename to save the result\n  -ot {text,json,csv}, --output-type {text,json,csv}\n                        output format default is \"text\".\n  -t TIMEOUT, --timeout TIMEOUT\n                        request timeout default is 360 sec.\n  -l LIMIT, --limit LIMIT\n                        limit results default is 10000.\n  -nc, --no-color       show result without color.\n  -lv, --list-view-type\n                        list view type.\n  -lm, --list-methods   list methods.\n  --init INIT           set the api token.\n  -v, --version         version.\n```\n\nExamples:\n```\n# Scan company by domain\nchiasmodon_cli.py example.com --scan\n\n# Search for target domain, you will see the result for only this \"example.com\" \nchiasmodon_cli.py example.com \n    \n# Search in target and target subdomains\nchiasmodon_cli.py example.com --method domain.all\n\n# Search for target subdomains\nchiasmodon_cli.py example.com --view-type subdomain\n        \n# Search for all creds in United States \nchiasmodon_cli.py US --method cred.country\n\n# Search for related companies by domain\nchiasmodon_cli.py example.com --view-type related\n\n# search for target app id \nchiasmodon_cli.py com.discord --method app.id \n    \n# search for target app domain \nchiasmodon_cli.py discord.com --method app.domain\n    \n# search for target app name \nchiasmodon_cli.py Discord --method app.name\n    \n# Search for ip asn\nchiasmodon_cli.py AS123 --method ip.asn\n\n# Search for cred username\nchiasmodon_cli.py someone --method cred.username\n\n# Search for cred password\nchiasmodon_cli.py example@123 --method cred.password\n\n# Search for url endpoint\nchiasmodon_cli.py /wp-login.php --method url.path\n\n# Search for ip\nchiasmodon_cli.py 1.1.1.1 --method ip\n\n# Search for cidr\nchiasmodon_cli.py xx.xx.xx.0/24 --method ip\n\n# Search for target creds by domain emsils\nchiasmodon_cli.py example.com --method cred.email.domain\n\n# Search for target email\nchiasmodon_cli.py someone@example.com --method cred.email  \n\n# search for multiple targets: \nchiasmodon_cli.py targets.txt --method domain  --output example-creds.txt \n```\n\nPlease note that these examples represent only a fraction of the available options and use cases. Refer to the documentation for more detailed instructions and explore the full range of features provided by Chiasmodon.\n\n\n## \ud83d\udcac Contributions and Feedback\n\nContributions and feedback are welcome! If you encounter any issues or have suggestions for improvements, please submit them to the Chiasmodon GitHub repository. Your input will help us enhance the tool and make it more effective for the OSINT community.\n\n## \ud83d\udcdcLicense\n\nChiasmodon is released under the [MIT License](https://opensource.org/licenses/MIT). See the [LICENSE](https://github.com/chiasmodon/LICENSE.txt) file for more details.\n\n## \u26a0\ufe0fDisclaimer\n\nChiasmodon is intended for legal and authorized use only. Users are responsible for ensuring compliance with applicable laws and regulations when using the tool. The developers of Chiasmodon disclaim any responsibility for the misuse or illegal use of the tool.\n\n## \ud83d\udce2Acknowledgments\n\nChiasmodon is the result of collaborative efforts from a dedicated team of contributors who believe in the power of OSINT. We would like to express our gratitude to the open-source community for their valuable contributions and support.\n\n## \ud83d\udd17Chiasmodon Links\n\n- [\ud83d\udc0d Python Library](https://pypi.org/project/chiasmodon)\n- [\ud83d\udcf1 Mobile (APK)](https://github.com/chiasmod0n/chiasmodon-mobile)\n- [\ud83c\udf10 Website](https://chiasmodon.com)\n- [\ud83d\udcac Telegram](https://t.me/chiasmod0n)\n- [\ud83d\udc26 X/Twitter](https://x.com/chiasmod0n)\n\n\n## \u2b50\ufe0fStar History\n\n<a href=\"https://star-history.com/#chiasmod0n/chiasmodon&Date\">\n <picture>\n   <source media=\"(prefers-color-scheme: dark)\" srcset=\"https://api.star-history.com/svg?repos=chiasmod0n/chiasmodon&type=Date&theme=dark\" />\n   <source media=\"(prefers-color-scheme: light)\" srcset=\"https://api.star-history.com/svg?repos=chiasmod0n/chiasmodon&type=Date\" />\n   <img alt=\"Star History Chart\" src=\"https://api.star-history.com/svg?repos=chiasmod0n/chiasmodon&type=Date\" />\n </picture>\n</a>\n\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Chiasmodon is an OSINT tool that allows users to gather information from various sources and conduct targeted searches based on domains, Google Play applications, email addresses, IP addresses, organizations, URLs, and more. It provides comprehensive scanning capabilities, customizable output formats, and additional options for enhanced data analysis and customization.",
    "version": "2.0.1",
    "project_urls": {
        "Homepage": "https://github.com/chiasmod0n/chiasmodon"
    },
    "split_keywords": [
        "intelligence",
        "osint",
        "credentials",
        "emails",
        "asn",
        "cidr",
        "bugbounty",
        "subdomains",
        "information-gathering",
        "intelligence-analysis",
        "reconnaissance",
        "attack-surface",
        "subdomain-enumeration",
        "reconnaissance-framework",
        "bugbounty-tool",
        "email-enumeration",
        "chiasmodon"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "413a50597c3c08dd1e885f309d942ade1b5f725f24dc210749dff17c25715b42",
                "md5": "5b2be6e7471d86181f65f1a3829b0b41",
                "sha256": "27499852d2f75ac00780b7263cd9d6b6ac96e904ffbd240188a87631149fa4a3"
            },
            "downloads": -1,
            "filename": "chiasmodon-2.0.1.tar.gz",
            "has_sig": false,
            "md5_digest": "5b2be6e7471d86181f65f1a3829b0b41",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 15717,
            "upload_time": "2024-04-30T19:28:51",
            "upload_time_iso_8601": "2024-04-30T19:28:51.929455Z",
            "url": "https://files.pythonhosted.org/packages/41/3a/50597c3c08dd1e885f309d942ade1b5f725f24dc210749dff17c25715b42/chiasmodon-2.0.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-04-30 19:28:51",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "chiasmod0n",
    "github_project": "chiasmodon",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "requirements": [
        {
            "name": "tldextract",
            "specs": [
                [
                    "==",
                    "5.1.2"
                ]
            ]
        },
        {
            "name": "yaspin",
            "specs": [
                [
                    "==",
                    "3.0.1"
                ]
            ]
        },
        {
            "name": "argcomplete",
            "specs": [
                [
                    "==",
                    "3.3.0"
                ]
            ]
        },
        {
            "name": "requests",
            "specs": [
                [
                    "==",
                    "2.31.0"
                ]
            ]
        }
    ],
    "lcname": "chiasmodon"
}
        
Elapsed time: 0.28578s