chiasmodon


Namechiasmodon JSON
Version 1.1.17 PyPI version JSON
download
home_pagehttps://github.com/chiasmod0n/chiasmodon
SummaryChiasmodon is an OSINT (Open Source Intelligence) tool designed to assist in the process of gathering information about a target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials (usernames and passwords), CIDRs (Classless Inter-Domain Routing), ASNs (Autonomous System Numbers), and subdomains..
upload_time2024-04-23 19:44:54
maintainerNone
docs_urlNone
authorchiasmod0n
requires_pythonNone
licenseNone
keywords intelligence osint credentials emails asn cidr bugbounty subdomains information-gathering intelligence-analysis reconnaissance attack-surface subdomain-enumeration reconnaissance-framework bugbounty-tool email-enumeration chiasmodon
VCS
bugtrack_url
requirements tldextract yaspin requests
Travis-CI No Travis.
coveralls test coverage No coveralls.
            
# Chiasmodon

[![asciicast](https://asciinema.org/a/W3jCmEetvRT6JjrBVDyKtSfbg.svg)](https://asciinema.org/a/W3jCmEetvRT6JjrBVDyKtSfbg)
<p align="center">
<img src="https://badge.fury.io/py/chiasmodon.svg" />
</p>
Chiasmodon is an OSINT (Open Source Intelligence) tool designed to assist in the process of gathering information about target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials (usernames and passwords), CIDRs (Classless Inter-Domain Routing), ASNs (Autonomous System Numbers), and subdomains. the tool allows users to search by domain, CIDR, ASN, email, username, password, or Google Play application ID. 




## ✨Features

- [x] **🌐Domain**: Conduct targeted searches by specifying a domain name to gather relevant information related to the domain.
- [x] **🎮Google Play Application**: Search for information related to a specific application on the Google Play Store by providing the application ID.
- [x] **🔎CIDR and 🔢ASN**: Explore CIDR blocks and Autonomous System Numbers (ASNs) associated with the target domain to gain insights into network infrastructure and potential vulnerabilities.
- [x] **✉️Email, 👤Username, 🔒Password**: Conduct searches based on email, username, or password to identify potential security risks or compromised credentials.
- [x] **🔍Scan**: Perform a comprehensive scan on a given company domain name in one click, including finding
  - Related companies.
  - App applications.
  - ASNs, CIDRs/Subnets.
  - Client credentials (`Email, Username, Password`).
  - Employee credentials (`Email, Username, Password`)
  - Subdomains.
  - URLs (`Domain/IP, Port, Endpoint`)
- [X] **🌍Country**: Sort and filter search results by country to gain insights into the geographic distribution of the identified information.
- [x] **📋Output Customization**: Choose the desired output format (text, JSON, or CSV) and specify the filename to save the search results.
- [x] **⚙️Additional Options**: The tool offers various additional options, such as viewing different result types (credentials, URLs, subdomains, emails, passwords, usernames, or applications), setting API tokens, specifying timeouts, limiting results, and more.

## 🚀Comming soon

- **📱Phone**: Get ready to uncover even more valuable data by searching for information associated with phone numbers. Whether you're investigating a particular individual or looking for connections between phone numbers and other entities, this new feature will provide you with valuable insights.

- **🏢Company Name**: We understand the importance of comprehensive company research. In our upcoming release, you'll be able to search by company name and access a wide range of documents associated with that company. This feature will provide you with a convenient and efficient way to gather crucial information, such as legal documents, financial reports, and other relevant records.

- **👤Face (Photo)**: Visual data is a powerful tool, and we are excited to introduce our advanced facial recognition feature. With "Search by Face (Photo)," you can upload an image containing a face and leverage cutting-edge technology to identify and match individuals across various data sources. This will allow you to gather valuable information, such as social media profiles, online presence, and potential connections, all through the power of facial recognition.

## Why Chiasmodon name ?
Chiasmodon niger is a species of deep sea fish in the family Chiasmodontidae. It is known for its ability to **swallow fish larger than itself**. and so do we. 😉
![Chiasmodon background](https://journal.voca.network/wp-content/uploads/2017/10/DTR083_1200.png)

## 🔑 Subscription
Join us today and unlock the potential of our cutting-edge OSINT tool. Contact https://t.me/Chiasmod0n on Telegram to subscribe and start harnessing the power of Chiasmodon for your domain investigations.

## ⬇️Install
```bash
pip install chiasmodon
```
## 💻Usage
Chiasmodon provides a flexible and user-friendly command-line interface and python library. Here are some examples to demonstrate its usage:


```
usage: chiasmodon_cli.py [-h] [-d DOMAIN] [-a APP] [-c CIDR] [-n ASN] [-e EMAIL] [-u USERNAME] [-p PASSWORD] [-ep ENDPOINT] [-C COUNTRY] [-A] [-de] [-r] [-s] [-sr SCAN_RELATED]
                         [-sa SCAN_APPS] [-sc SCAN_CLIENTS] [-se SCAN_EMPLOYEES] [-o OUTPUT] [-vt {cred,url,subdomain,email,password,username,app,endpoint,port}] [-ot {text,json,csv}]
                         [--init INIT] [-T TIMEOUT] [-L LIMIT] [-v]

Chiasmodon CLI

options:
  -h, --help            show this help message and exit
  -d DOMAIN, --domain DOMAIN
                        Search by domain.
  -a APP, --app APP     Search by google play applciton id.
  -c CIDR, --cidr CIDR  Search by cidr or ip address.
  -n ASN, --asn ASN     Search by asn.
  -e EMAIL, --email EMAIL
                        Search by email, only pro, only pro account.
  -u USERNAME, --username USERNAME
                        Search by username, only pro account.
  -p PASSWORD, --password PASSWORD
                        Search by password, only pro account.
  -ep ENDPOINT, --endpoint ENDPOINT
                        Search by url endpoint.
  -C COUNTRY, --country COUNTRY
                        sort result by country code default is all
  -A, --all             view all result using "like",this option work only with (-d or --domain),default is False
  -de, --domain-emails  only result for company "root" domain, this option work only with (-d or --domain), default is False
  -r, --related         Get related company domains,this option work only with (-d or --domain), default False
  -s, --scan            scan the company domain (Related company, Clients, Employees, Company ASNs,Company CIDRs/Subnets, Company Apps).
  -sr SCAN_RELATED, --scan-related SCAN_RELATED
                        Run related scan, default is yes, Ex: -sr no
  -sa SCAN_APPS, --scan-apps SCAN_APPS
                        Run App scan, default is yes, Ex: -sa no
  -sc SCAN_CLIENTS, --scan-clients SCAN_CLIENTS
                        Run clients scan, default is yes, Ex: -sc no
  -se SCAN_EMPLOYEES, --scan-employees SCAN_EMPLOYEES
                        Run employees scan, default is yes, Ex: -se no
  -o OUTPUT, --output OUTPUT
                        filename to save the result
  -vt {cred,url,subdomain,email,password,username,app,endpoint,port}, --view-type {cred,url,subdomain,email,password,username,app,endpoint,port}
                        type view the result default is "cred".
  -ot {text,json,csv}, --output-type {text,json,csv}
                        output format default is "text".
  --init INIT           set the api token.
  -T TIMEOUT, --timeout TIMEOUT
                        request timeout default is 360 sec.
  -L LIMIT, --limit LIMIT
                        limit results default is 10000.
  -v, --version         version.

Examples:

    # Scan company by domain
    chiasmodon_cli.py --domain example.com --scan

    # Search for target domain, you will see the result for only this "example.com" 
    chiasmodon_cli.py --domain example.com 
    
    # Search for target subdomains
    chiasmodon_cli.py --domain example.com --all 
    
    # Search for target domain, you will see the result for only this "example.com" on United States 
    chiasmodon_cli.py --domain example.com --country US 

    # Search for related companies by domain
    chiasmodon_cli.py --domain example.com --related

    # search for target app id 
    chiasmodon_cli.py --app com.example 
    
    # Search for target asn
    chiasmodon_cli.py --asn AS123 --type-view cred

    # Search for target username
    chiasmodon_cli.py --username someone --country CA

    # Search for target password
    chiasmodon_cli.py --password example@123

    # Search for target endpoint
    chiasmodon_cli.py --endpoint /wp-login.php

    # Search for target cidr
    chiasmodon_cli.py --cidr x.x.x.x/24

    # Search for target creds by domain emsils
    chiasmodon_cli.py --domain example.com --domain-emails 
    chiasmodon_cli.py --domain example.com --domain-emails --output example-creds.json --output-type json
    chiasmodon_cli.py --domain example.com --domain-emails --view-type email --output example-emails.txt --output-type text
    
    # Search for target subdomain
    chiasmodon_cli.py --domain company.com --view-type subdomain
    
    # Search for target email
    chiasmodon_cli.py --email someone@example.com  
    chiasmodon_cli.py --email someone@example.com --view-type url 

    # search for multiple targets: 
    chiasmodon_cli.py --domain targets.txt --output example-creds.txt 
    chiasmodon_cli.py --domain targets.txt --view-type url --output example-urls.txt 
```

***How to use pychiasmodon library***:
```python
from pychiasmodon import Chiasmodon 
ch = Chiasmodon()
```
- **Search for target subdomains**:
    - *Command line*
        ```bash
        chiasmodon_cli.py --domain example.com --all
        ```
    - *Python*
        ```python
        result = ch.search('example.com',method='domain', all=True)
        
        for i in result:
            print(i)
        ```

- **Searching for target domain, you will see the result for only this "example.com"**:
    - *Command line*
        ```bash
        chiasmodon_cli.py --domain example.com
        ```
    - *Python*
        ```python
        result = ch.search('example.com',method='domain')
        
        for i in result:
            print(i)
        ```

- **Searching for target domain, you will see the result for only this "example.com" on United States**:
    - *Command line*
        ```bash
        chiasmodon_cli.py --domain example.com --country US
        ```
    - *Python*
        ```python
        result = ch.search('example.com',method='domain',country="US")
        
        for i in result:
            print(i)
        ```


- **Searching for target application ID on the Google Play Store**:
    - *Command line*
        ```bash
        chiasmodon_cli.py --app com.discord
        ```
    - *Python*
        ```python
        result = ch.search('com.example',method='app')

        for i in result:
            print(i)
        ```

- **Searching for target ASN**:
    - *Command line*
        ```bash
        chiasmodon_cli.py --asn AS123 --view-type cred
        ```
    - *Python*
        ```python
        result = ch.search('AS123',method='asn', view_type='cred')

        for i in result:
            print(i)
        ```


- **earching for target username**:
    - *Command line*
        ```bash
        chiasmodon_cli.py --username someone
        ```
    - *Python*
        ```python
        result = ch.search('someone',method='username')

        for i in result:
            print(i)
        ```

- **Searching for target password**:

    - *Command line*
        ```bash
        chiasmodon_cli.py --password example@123
        ```
    - *Python*
        ```python
        result = ch.search('example@123',method='password')

        for i in result:
            print(i)
        ```

- **Searching for target CIDR**:

    - *Command line*
        ```bash
        chiasmodon_cli.py --cidr x.x.x.x/24
        ```
    - *Python*
        ```python
        result = ch.search('x.x.x.x/24',method='cidr')

        for i in result:
            print(i)
        ```

- **Searching for target credentials by domain emails**:

    - *Command line*
        ```bash
        chiasmodon_cli.py --domain example.com --domain-emails
        ```
    - *Python*
        ```python
        result = ch.search('example.com',method='domain', only_domain_emails=True)

        for i in result:
            print(i)
        ```
- **All methods and view types**:

    | Methods | View Type   |
    |-----------------|-----------------|
    | --domain, --email, --cidr, --app, --asn, --username, --password | --view-type cred        |
    | --domain, --email, --username, --password       | --view-type app |       
    | --domain, --email, --cidr, --asn, --username, --password | --view-type url      
    | --domain                                      |--view-type subdomain |
    | --domain, --cidr, --asn, --app                      |--view-type email     | 
    | --domain, --cidr, --app, --asn, --email, --password     |--view-type username  |
    | --domain, --cidr, --app, --asn, --email, --username     |--view-type password  |

Please note that these examples represent only a fraction of the available options and use cases. Refer to the documentation for more detailed instructions and explore the full range of features provided by Chiasmodon.


## 💬 Contributions and Feedback

Contributions and feedback are welcome! If you encounter any issues or have suggestions for improvements, please submit them to the Chiasmodon GitHub repository. Your input will help us enhance the tool and make it more effective for the OSINT community.

## 📜License

Chiasmodon is released under the [MIT License](https://opensource.org/licenses/MIT). See the [LICENSE](https://github.com/chiasmodon/LICENSE.txt) file for more details.

## ⚠️Disclaimer

Chiasmodon is intended for legal and authorized use only. Users are responsible for ensuring compliance with applicable laws and regulations when using the tool. The developers of Chiasmodon disclaim any responsibility for the misuse or illegal use of the tool.

## 📢Acknowledgments

Chiasmodon is the result of collaborative efforts from a dedicated team of contributors who believe in the power of OSINT. We would like to express our gratitude to the open-source community for their valuable contributions and support.

## 🔗Chiasmodon Links

- [🐍 Python Library](https://pypi.org/project/chiasmodon)
- [📱 Mobile (APK)](https://github.com/chiasmod0n/chiasmodon-mobile)
- [🌐 Website](https://chiasmodon.com)
- [💬 Telegram](https://t.me/chiasmod0n)
- [🐦 X/Twitter](https://x.com/chiasmod0n)


## ⭐️Star History

<a href="https://star-history.com/#chiasmod0n/chiasmodon&Date">
 <picture>
   <source media="(prefers-color-scheme: dark)" srcset="https://api.star-history.com/svg?repos=chiasmod0n/chiasmodon&type=Date&theme=dark" />
   <source media="(prefers-color-scheme: light)" srcset="https://api.star-history.com/svg?repos=chiasmod0n/chiasmodon&type=Date" />
   <img alt="Star History Chart" src="https://api.star-history.com/svg?repos=chiasmod0n/chiasmodon&type=Date" />
 </picture>
</a>


            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/chiasmod0n/chiasmodon",
    "name": "chiasmodon",
    "maintainer": null,
    "docs_url": null,
    "requires_python": null,
    "maintainer_email": null,
    "keywords": "intelligence osint credentials emails asn cidr bugbounty subdomains information-gathering intelligence-analysis reconnaissance attack-surface subdomain-enumeration reconnaissance-framework bugbounty-tool email-enumeration chiasmodon",
    "author": "chiasmod0n",
    "author_email": null,
    "download_url": "https://files.pythonhosted.org/packages/f8/d7/12e34c7acfb18a3c4883e9a2a24009544d2d313ae8629e7d6574db2a96c7/chiasmodon-1.1.17.tar.gz",
    "platform": null,
    "description": "\n# Chiasmodon\n\n[![asciicast](https://asciinema.org/a/W3jCmEetvRT6JjrBVDyKtSfbg.svg)](https://asciinema.org/a/W3jCmEetvRT6JjrBVDyKtSfbg)\n<p align=\"center\">\n<img src=\"https://badge.fury.io/py/chiasmodon.svg\" />\n</p>\nChiasmodon is an OSINT (Open Source Intelligence) tool designed to assist in the process of gathering information about target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials (usernames and passwords), CIDRs (Classless Inter-Domain Routing), ASNs (Autonomous System Numbers), and subdomains. the tool allows users to search by domain, CIDR, ASN, email, username, password, or Google Play application ID. \n\n\n\n\n## \u2728Features\n\n- [x] **\ud83c\udf10Domain**: Conduct targeted searches by specifying a domain name to gather relevant information related to the domain.\n- [x] **\ud83c\udfaeGoogle Play Application**: Search for information related to a specific application on the Google Play Store by providing the application ID.\n- [x] **\ud83d\udd0eCIDR and \ud83d\udd22ASN**: Explore CIDR blocks and Autonomous System Numbers (ASNs) associated with the target domain to gain insights into network infrastructure and potential vulnerabilities.\n- [x] **\u2709\ufe0fEmail, \ud83d\udc64Username, \ud83d\udd12Password**: Conduct searches based on email, username, or password to identify potential security risks or compromised credentials.\n- [x] **\ud83d\udd0dScan**: Perform a comprehensive scan on a given company domain name in one click, including finding\n  - Related companies.\n  - App applications.\n  - ASNs, CIDRs/Subnets.\n  - Client credentials (`Email, Username, Password`).\n  - Employee credentials (`Email, Username, Password`)\n  - Subdomains.\n  - URLs (`Domain/IP, Port, Endpoint`)\n- [X] **\ud83c\udf0dCountry**: Sort and filter search results by country to gain insights into the geographic distribution of the identified information.\n- [x] **\ud83d\udccbOutput Customization**: Choose the desired output format (text, JSON, or CSV) and specify the filename to save the search results.\n- [x] **\u2699\ufe0fAdditional Options**: The tool offers various additional options, such as viewing different result types (credentials, URLs, subdomains, emails, passwords, usernames, or applications), setting API tokens, specifying timeouts, limiting results, and more.\n\n## \ud83d\ude80Comming soon\n\n- **\ud83d\udcf1Phone**: Get ready to uncover even more valuable data by searching for information associated with phone numbers. Whether you're investigating a particular individual or looking for connections between phone numbers and other entities, this new feature will provide you with valuable insights.\n\n- **\ud83c\udfe2Company Name**: We understand the importance of comprehensive company research. In our upcoming release, you'll be able to search by company name and access a wide range of documents associated with that company. This feature will provide you with a convenient and efficient way to gather crucial information, such as legal documents, financial reports, and other relevant records.\n\n- **\ud83d\udc64Face (Photo)**: Visual data is a powerful tool, and we are excited to introduce our advanced facial recognition feature. With \"Search by Face (Photo),\" you can upload an image containing a face and leverage cutting-edge technology to identify and match individuals across various data sources. This will allow you to gather valuable information, such as social media profiles, online presence, and potential connections, all through the power of facial recognition.\n\n## Why Chiasmodon name ?\nChiasmodon niger is a species of deep sea fish in the family Chiasmodontidae. It is known for its ability to **swallow fish larger than itself**. and so do we. \ud83d\ude09\n![Chiasmodon background](https://journal.voca.network/wp-content/uploads/2017/10/DTR083_1200.png)\n\n## \ud83d\udd11 Subscription\nJoin us today and unlock the potential of our cutting-edge OSINT tool. Contact https://t.me/Chiasmod0n on Telegram to subscribe and start harnessing the power of Chiasmodon for your domain investigations.\n\n## \u2b07\ufe0fInstall\n```bash\npip install chiasmodon\n```\n## \ud83d\udcbbUsage\nChiasmodon provides a flexible and user-friendly command-line interface and python library. Here are some examples to demonstrate its usage:\n\n\n```\nusage: chiasmodon_cli.py [-h] [-d DOMAIN] [-a APP] [-c CIDR] [-n ASN] [-e EMAIL] [-u USERNAME] [-p PASSWORD] [-ep ENDPOINT] [-C COUNTRY] [-A] [-de] [-r] [-s] [-sr SCAN_RELATED]\n                         [-sa SCAN_APPS] [-sc SCAN_CLIENTS] [-se SCAN_EMPLOYEES] [-o OUTPUT] [-vt {cred,url,subdomain,email,password,username,app,endpoint,port}] [-ot {text,json,csv}]\n                         [--init INIT] [-T TIMEOUT] [-L LIMIT] [-v]\n\nChiasmodon CLI\n\noptions:\n  -h, --help            show this help message and exit\n  -d DOMAIN, --domain DOMAIN\n                        Search by domain.\n  -a APP, --app APP     Search by google play applciton id.\n  -c CIDR, --cidr CIDR  Search by cidr or ip address.\n  -n ASN, --asn ASN     Search by asn.\n  -e EMAIL, --email EMAIL\n                        Search by email, only pro, only pro account.\n  -u USERNAME, --username USERNAME\n                        Search by username, only pro account.\n  -p PASSWORD, --password PASSWORD\n                        Search by password, only pro account.\n  -ep ENDPOINT, --endpoint ENDPOINT\n                        Search by url endpoint.\n  -C COUNTRY, --country COUNTRY\n                        sort result by country code default is all\n  -A, --all             view all result using \"like\",this option work only with (-d or --domain),default is False\n  -de, --domain-emails  only result for company \"root\" domain, this option work only with (-d or --domain), default is False\n  -r, --related         Get related company domains,this option work only with (-d or --domain), default False\n  -s, --scan            scan the company domain (Related company, Clients, Employees, Company ASNs,Company CIDRs/Subnets, Company Apps).\n  -sr SCAN_RELATED, --scan-related SCAN_RELATED\n                        Run related scan, default is yes, Ex: -sr no\n  -sa SCAN_APPS, --scan-apps SCAN_APPS\n                        Run App scan, default is yes, Ex: -sa no\n  -sc SCAN_CLIENTS, --scan-clients SCAN_CLIENTS\n                        Run clients scan, default is yes, Ex: -sc no\n  -se SCAN_EMPLOYEES, --scan-employees SCAN_EMPLOYEES\n                        Run employees scan, default is yes, Ex: -se no\n  -o OUTPUT, --output OUTPUT\n                        filename to save the result\n  -vt {cred,url,subdomain,email,password,username,app,endpoint,port}, --view-type {cred,url,subdomain,email,password,username,app,endpoint,port}\n                        type view the result default is \"cred\".\n  -ot {text,json,csv}, --output-type {text,json,csv}\n                        output format default is \"text\".\n  --init INIT           set the api token.\n  -T TIMEOUT, --timeout TIMEOUT\n                        request timeout default is 360 sec.\n  -L LIMIT, --limit LIMIT\n                        limit results default is 10000.\n  -v, --version         version.\n\nExamples:\n\n    # Scan company by domain\n    chiasmodon_cli.py --domain example.com --scan\n\n    # Search for target domain, you will see the result for only this \"example.com\" \n    chiasmodon_cli.py --domain example.com \n    \n    # Search for target subdomains\n    chiasmodon_cli.py --domain example.com --all \n    \n    # Search for target domain, you will see the result for only this \"example.com\" on United States \n    chiasmodon_cli.py --domain example.com --country US \n\n    # Search for related companies by domain\n    chiasmodon_cli.py --domain example.com --related\n\n    # search for target app id \n    chiasmodon_cli.py --app com.example \n    \n    # Search for target asn\n    chiasmodon_cli.py --asn AS123 --type-view cred\n\n    # Search for target username\n    chiasmodon_cli.py --username someone --country CA\n\n    # Search for target password\n    chiasmodon_cli.py --password example@123\n\n    # Search for target endpoint\n    chiasmodon_cli.py --endpoint /wp-login.php\n\n    # Search for target cidr\n    chiasmodon_cli.py --cidr x.x.x.x/24\n\n    # Search for target creds by domain emsils\n    chiasmodon_cli.py --domain example.com --domain-emails \n    chiasmodon_cli.py --domain example.com --domain-emails --output example-creds.json --output-type json\n    chiasmodon_cli.py --domain example.com --domain-emails --view-type email --output example-emails.txt --output-type text\n    \n    # Search for target subdomain\n    chiasmodon_cli.py --domain company.com --view-type subdomain\n    \n    # Search for target email\n    chiasmodon_cli.py --email someone@example.com  \n    chiasmodon_cli.py --email someone@example.com --view-type url \n\n    # search for multiple targets: \n    chiasmodon_cli.py --domain targets.txt --output example-creds.txt \n    chiasmodon_cli.py --domain targets.txt --view-type url --output example-urls.txt \n```\n\n***How to use pychiasmodon library***:\n```python\nfrom pychiasmodon import Chiasmodon \nch = Chiasmodon()\n```\n- **Search for target subdomains**:\n    - *Command line*\n        ```bash\n        chiasmodon_cli.py --domain example.com --all\n        ```\n    - *Python*\n        ```python\n        result = ch.search('example.com',method='domain', all=True)\n        \n        for i in result:\n            print(i)\n        ```\n\n- **Searching for target domain, you will see the result for only this \"example.com\"**:\n    - *Command line*\n        ```bash\n        chiasmodon_cli.py --domain example.com\n        ```\n    - *Python*\n        ```python\n        result = ch.search('example.com',method='domain')\n        \n        for i in result:\n            print(i)\n        ```\n\n- **Searching for target domain, you will see the result for only this \"example.com\" on United States**:\n    - *Command line*\n        ```bash\n        chiasmodon_cli.py --domain example.com --country US\n        ```\n    - *Python*\n        ```python\n        result = ch.search('example.com',method='domain',country=\"US\")\n        \n        for i in result:\n            print(i)\n        ```\n\n\n- **Searching for target application ID on the Google Play Store**:\n    - *Command line*\n        ```bash\n        chiasmodon_cli.py --app com.discord\n        ```\n    - *Python*\n        ```python\n        result = ch.search('com.example',method='app')\n\n        for i in result:\n            print(i)\n        ```\n\n- **Searching for target ASN**:\n    - *Command line*\n        ```bash\n        chiasmodon_cli.py --asn AS123 --view-type cred\n        ```\n    - *Python*\n        ```python\n        result = ch.search('AS123',method='asn', view_type='cred')\n\n        for i in result:\n            print(i)\n        ```\n\n\n- **earching for target username**:\n    - *Command line*\n        ```bash\n        chiasmodon_cli.py --username someone\n        ```\n    - *Python*\n        ```python\n        result = ch.search('someone',method='username')\n\n        for i in result:\n            print(i)\n        ```\n\n- **Searching for target password**:\n\n    - *Command line*\n        ```bash\n        chiasmodon_cli.py --password example@123\n        ```\n    - *Python*\n        ```python\n        result = ch.search('example@123',method='password')\n\n        for i in result:\n            print(i)\n        ```\n\n- **Searching for target CIDR**:\n\n    - *Command line*\n        ```bash\n        chiasmodon_cli.py --cidr x.x.x.x/24\n        ```\n    - *Python*\n        ```python\n        result = ch.search('x.x.x.x/24',method='cidr')\n\n        for i in result:\n            print(i)\n        ```\n\n- **Searching for target credentials by domain emails**:\n\n    - *Command line*\n        ```bash\n        chiasmodon_cli.py --domain example.com --domain-emails\n        ```\n    - *Python*\n        ```python\n        result = ch.search('example.com',method='domain', only_domain_emails=True)\n\n        for i in result:\n            print(i)\n        ```\n- **All methods and view types**:\n\n    | Methods | View Type   |\n    |-----------------|-----------------|\n    | --domain, --email, --cidr, --app, --asn, --username, --password | --view-type cred        |\n    | --domain, --email, --username, --password       | --view-type app |       \n    | --domain, --email, --cidr, --asn, --username, --password | --view-type url      \n    | --domain                                      |--view-type subdomain |\n    | --domain, --cidr, --asn, --app                      |--view-type email     | \n    | --domain, --cidr, --app, --asn, --email, --password     |--view-type username  |\n    | --domain, --cidr, --app, --asn, --email, --username     |--view-type password  |\n\nPlease note that these examples represent only a fraction of the available options and use cases. Refer to the documentation for more detailed instructions and explore the full range of features provided by Chiasmodon.\n\n\n## \ud83d\udcac Contributions and Feedback\n\nContributions and feedback are welcome! If you encounter any issues or have suggestions for improvements, please submit them to the Chiasmodon GitHub repository. Your input will help us enhance the tool and make it more effective for the OSINT community.\n\n## \ud83d\udcdcLicense\n\nChiasmodon is released under the [MIT License](https://opensource.org/licenses/MIT). See the [LICENSE](https://github.com/chiasmodon/LICENSE.txt) file for more details.\n\n## \u26a0\ufe0fDisclaimer\n\nChiasmodon is intended for legal and authorized use only. Users are responsible for ensuring compliance with applicable laws and regulations when using the tool. The developers of Chiasmodon disclaim any responsibility for the misuse or illegal use of the tool.\n\n## \ud83d\udce2Acknowledgments\n\nChiasmodon is the result of collaborative efforts from a dedicated team of contributors who believe in the power of OSINT. We would like to express our gratitude to the open-source community for their valuable contributions and support.\n\n## \ud83d\udd17Chiasmodon Links\n\n- [\ud83d\udc0d Python Library](https://pypi.org/project/chiasmodon)\n- [\ud83d\udcf1 Mobile (APK)](https://github.com/chiasmod0n/chiasmodon-mobile)\n- [\ud83c\udf10 Website](https://chiasmodon.com)\n- [\ud83d\udcac Telegram](https://t.me/chiasmod0n)\n- [\ud83d\udc26 X/Twitter](https://x.com/chiasmod0n)\n\n\n## \u2b50\ufe0fStar History\n\n<a href=\"https://star-history.com/#chiasmod0n/chiasmodon&Date\">\n <picture>\n   <source media=\"(prefers-color-scheme: dark)\" srcset=\"https://api.star-history.com/svg?repos=chiasmod0n/chiasmodon&type=Date&theme=dark\" />\n   <source media=\"(prefers-color-scheme: light)\" srcset=\"https://api.star-history.com/svg?repos=chiasmod0n/chiasmodon&type=Date\" />\n   <img alt=\"Star History Chart\" src=\"https://api.star-history.com/svg?repos=chiasmod0n/chiasmodon&type=Date\" />\n </picture>\n</a>\n\n",
    "bugtrack_url": null,
    "license": null,
    "summary": "Chiasmodon is an OSINT (Open Source Intelligence) tool designed to assist in the process of gathering information about a target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials (usernames and passwords), CIDRs (Classless Inter-Domain Routing), ASNs (Autonomous System Numbers), and subdomains..",
    "version": "1.1.17",
    "project_urls": {
        "Homepage": "https://github.com/chiasmod0n/chiasmodon"
    },
    "split_keywords": [
        "intelligence",
        "osint",
        "credentials",
        "emails",
        "asn",
        "cidr",
        "bugbounty",
        "subdomains",
        "information-gathering",
        "intelligence-analysis",
        "reconnaissance",
        "attack-surface",
        "subdomain-enumeration",
        "reconnaissance-framework",
        "bugbounty-tool",
        "email-enumeration",
        "chiasmodon"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "f8d712e34c7acfb18a3c4883e9a2a24009544d2d313ae8629e7d6574db2a96c7",
                "md5": "1f78ee8bb90369d112633d8a2e58a01f",
                "sha256": "60a049e645101ab6a2c2db31133e6b157a7374569f8fb6a81971f574376881a5"
            },
            "downloads": -1,
            "filename": "chiasmodon-1.1.17.tar.gz",
            "has_sig": false,
            "md5_digest": "1f78ee8bb90369d112633d8a2e58a01f",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 16775,
            "upload_time": "2024-04-23T19:44:54",
            "upload_time_iso_8601": "2024-04-23T19:44:54.563405Z",
            "url": "https://files.pythonhosted.org/packages/f8/d7/12e34c7acfb18a3c4883e9a2a24009544d2d313ae8629e7d6574db2a96c7/chiasmodon-1.1.17.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-04-23 19:44:54",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "chiasmod0n",
    "github_project": "chiasmodon",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "requirements": [
        {
            "name": "tldextract",
            "specs": [
                [
                    "==",
                    "5.1.2"
                ]
            ]
        },
        {
            "name": "yaspin",
            "specs": [
                [
                    "==",
                    "3.0.1"
                ]
            ]
        },
        {
            "name": "requests",
            "specs": [
                [
                    "==",
                    "2.31.0"
                ]
            ]
        }
    ],
    "lcname": "chiasmodon"
}
        
Elapsed time: 0.25211s