We just added Python code to use the Intelligence X API! You can find the code in the SDK at https://github.com/IntelligenceX/SDK.
The code comes with a default API key so you can get started right away. For details on usage please look at the readme file in the SDK.
The SDK already has code implementations in HTML, PHP, and Go. It also features a command-line program written in Go, and can be compiled on Windows/Linux/Mac. The Python reference implementation is the latest addition to help developers integrate our search engine and our special Phonebook feature.
There are 2 scripts included in the SDK:
The first script “ix_search.py” looks for any selectors, and returns all results that contain the selector. Each result has a unique “systemid” that can be used to query the actual data (note that the source data could be anything from a HTML document, a text file, a Word document, a PDF, etc.).
The second script “ix_phonebook.py” makes a phonebook lookup, i.e. it lists all selectors known for the search term. In the example below, it lists known email addresses, URLs, and domains belonging to facebook.com.
August 2019: Latest Updates 👋 The last newsletter was sent out early July 2019. Since then, we have new features and blog posts to share! Our free OSINT tool suite has been substantially upgraded. 🕵🏻 OSINT Tools: More tabs, more functionality Check out our free OSINT tools at https://intelx.io/tools. The third-party search allows you to
When talking about viruses on the darknet, the focus is usually on malware that can be purchased or rented (which gets increasingly popular with ransomware). There are also viruses that use the darknet for C&C (command & control) purposes. However, this blog post investigates viruses on the darknet websites themselves – which are usually based
We have uploaded all the WikiLeaks data to Intelligence X and created a new category. You do not need an account or license to search through the WikiLeaks data using our site. Try it out here! https://intelx.io/?s=cnn.com&b=leaks.public.wikileaks Source & Challenges Most of the raw data is available via https://file.wikileaks.org/file/ as well as torrents. There are