updated Description and removed redundant comments

pull/615/head
Usama015 2023-06-14 12:23:04 +05:00
parent 41115f5519
commit 15728bb801
4 changed files with 12 additions and 21 deletions

View File

@ -1851,7 +1851,9 @@ Module to query a local instance of uwhois (https://github.com/rafiot/uwhoisd).
<img src=logos/whoisfreaks.png height=60>
An expansion module for https://whoisfreaks.com/ that will provide an enriched analysis of the provided domain, including WHOIS and DNS information
An expansion module for https://whoisfreaks.com/ that will provide an enriched analysis of the provided domain, including WHOIS and DNS information.
Our Whois service, DNS Lookup API, and SSL analysis, equips organizations with comprehensive threat intelligence and attack surface analysis capabilities for enhanced security.
Explore our website's product section at https://whoisfreaks.com/ for a wide range of additional services catering to threat intelligence and attack surface analysis needs.
- **features**:
>The module takes a domain as input and queries the Whoisfreaks API with it.
>

View File

@ -1848,7 +1848,9 @@ Module to query a local instance of uwhois (https://github.com/rafiot/uwhoisd).
<img src=../logos/whoisfreaks.png height=60>
An expansion module for https://whoisfreaks.com/ that will provide an enriched analysis of the provided domain, including WHOIS and DNS information
An expansion module for https://whoisfreaks.com/ that will provide an enriched analysis of the provided domain, including WHOIS and DNS information.
Our Whois service, DNS Lookup API, and SSL analysis, equips organizations with comprehensive threat intelligence and attack surface analysis capabilities for enhanced security.
Explore our website's product section at https://whoisfreaks.com/ for a wide range of additional services catering to threat intelligence and attack surface analysis needs.
- **features**:
>The module takes a domain as input and queries the Whoisfreaks API with it.
>

View File

@ -1,5 +1,5 @@
{
"description": "An expansion module for https://whoisfreaks.com/ that will provide an enriched analysis of the provided domain, including WHOIS and DNS information",
"description": "An expansion module for https://whoisfreaks.com/ that will provide an enriched analysis of the provided domain, including WHOIS and DNS information.\nOur Whois service, DNS Lookup API, and SSL analysis, equips organizations with comprehensive threat intelligence and attack surface analysis capabilities for enhanced security. \nExplore our website's product section at https://whoisfreaks.com/ for a wide range of additional services catering to threat intelligence and attack surface analysis needs.",
"logo": "whoisfreaks.png",
"requirements": [
"An access to the Whoisfreaks API_KEY"

View File

@ -117,7 +117,7 @@ def expand_whois(apiKey, domain):
'types': ['domain'],
'values': ns_servers,
'categories': ['Attribution'],
'comment': 'list of name server for %s by whoisFreaks'
'comment': 'Name server for %s by whoisFreaks'
% domain
}
@ -162,7 +162,7 @@ def expand_dns(apiKey, domain):
'values': ['%s|%s' % (domain, ipv4) for ipv4 in
list_ipv4],
'categories': ['Network activity'],
'comment': ' List ipv4 of %s ' %
'comment': 'ipv4 of %s ' %
domain
})
if list_ipv6:
@ -170,7 +170,7 @@ def expand_dns(apiKey, domain):
'values': ['%s|%s' % (domain, ipv6) for ipv6 in
list_ipv6],
'categories': ['Network activity'],
'comment': ' List ipv6 of %s' %
'comment': 'ipv6 of %s' %
domain
})
@ -178,14 +178,14 @@ def expand_dns(apiKey, domain):
r.append({'types': ['domain'],
'values': servers_mx,
'categories': ['Network activity'],
'comment': ' List mx of %s' %
'comment': 'mx of %s' %
domain
})
if soa_hostnames:
r.append({'types': ['domain'],
'values': soa_hostnames,
'categories': ['Network activity'],
'comment': ' List soa of %s' %
'comment': 'soa hostname of %s' %
domain
})
@ -220,16 +220,3 @@ def introspection():
def version():
moduleinfo['config'] = moduleconfig
return moduleinfo
# def main():
# apiKey = 'b7d971e9fe0f43d097d130e245b0f687'
# domain = 'google.com'
# return handle_domain(apiKey, domain, misperrors)
# if __name__ == '__main__':
# main()