Mimir functions as a CLI to HoneyDB which in short is an OSINT aggragative threat intel pool
– The purpose of this tool is to make intelligence gathering easier by including functionality to save the Threat Feed and Bad Host lists, and invoke either an in-script WHOIS lookup or Nmap scan to learn more about the target hosts. Logs are saved in the current working directory for future reference and further processing.
– HoneyDB provides a data visualization service, this can be accessed via Mimir by selecting their respective options. Selenium will then employ the Geckodriver to open the pages.
+ Python 2.7.x
+ honeydb api key, login here: https://riskdiscovery.com/honeydb/#login
+ pycurl, selenium, blessings, ipwhois & pprint python module:
+ Mozila gecko driver https://github.com/mozilla/geckodriver/releases
git clone https://github.com/NullArray/Mimir && cd Mimir