#whois it? Let's find out!

Overview

whois_bot

#whois it? Let's find out!

Currently in development: a gatekeeper bot for a community (https://t.me/IT_antalya) of 250+ expat IT pros of Antalya, Turkey. (@who_ru_bot).

Removes all chat messages from users the bot does not yet know. Before writing, a newcomer has to tell the bot about themselves in private, then they are free to write.

Currently working on:

  • Refactoring;
  • Edit function;
  • Migration to an asynch framework, i.e. Telethon;
  • Normal README :)
You might also like...
Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228)
Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228)

log4j-finder A Python3 script to scan the filesystem to find Log4j2 that is vulnerable to Log4Shell (CVE-2021-44228) It scans recursively both on disk

Password-Manager - This app can generate ,save , find and delete passwords.

Password-Manager This app can generate ,save , find and delete passwords. In the StartUp() Function , there are three buttons to choose from : Generat

Click-Jack - Automatic tool to find Clickjacking Vulnerability in various Web applications
Click-Jack - Automatic tool to find Clickjacking Vulnerability in various Web applications

CLICK-Jack It is a automatic tool to find Clickjacking Vulnerability in various

Automated tool to find & created Exploit Poc for Clickjacking Vulnerability
Automated tool to find & created Exploit Poc for Clickjacking Vulnerability

ClickJackPoc This tool will help you automate finding Clickjacking Vulnerability by just passing a file containing list of Targets . Once the Target i

Yesitsme - Simple OSINT script to find Instagram profiles by name and e-mail/phone
Yesitsme - Simple OSINT script to find Instagram profiles by name and e-mail/phone

Simple OSINT script to find Instagram profiles by name and e-mail/phone

A tool to find good RCE From my series: A powerful Burp extension to make bounties rain

A tool to find good RCE From my series: A powerful Burp extension to make bounties rain

 automatically crawl every URL and find cross site scripting (XSS)
automatically crawl every URL and find cross site scripting (XSS)

scancss Fastest tool to find XSS. scancss is a fastest tool to detect Cross Site scripting (XSS) automatically and it's also an intelligent payload ge

A simple tool to audit Unix/*BSD/Linux system libraries to find public security vulnerabilities
A simple tool to audit Unix/*BSD/Linux system libraries to find public security vulnerabilities

master_librarian A simple tool to audit Unix/*BSD/Linux system libraries to find public security vulnerabilities. To install requirements: $ sudo pyth

Whois-Python - Get Whois Domain with Python GUI

Whois-Python-GUI Get Whois Domain with Python - GUI :) WARNING Dont Copy ! - W

#whois it? Let's find out!

whois_bot #whois it? Let's find out! Currently in development: a gatekeeper bot for a community (https://t.me/IT_antalya) of 250+ expat IT pros of Ant

A RESTful whois

whois-rest A RESTful whois. Installation $ pip install poetry $ poetry install $ uvicorn app:app INFO: Started server process [64616] INFO: W

Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) with this python package
Build custom OSINT tools and APIs (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whois, Metadata & built-in database for more info) with this python package

Build custom OSINT tools and APIs with this python package - It includes different OSINT modules (Ping, Traceroute, Scans, Archives, DNS, Scrape, Whoi

DomainMonitor is a web project that has a RESTful API to get a domain's subdomains and whois data.
DomainMonitor is a web project that has a RESTful API to get a domain's subdomains and whois data.

DomainMonitor is a web project that has a RESTful API to get a domain's subdomains and whois data.

Multi-asset backtesting framework. An intuitive API lets analysts try out their strategies right away
Multi-asset backtesting framework. An intuitive API lets analysts try out their strategies right away

Multi-asset backtesting framework. An intuitive API lets analysts try out their strategies right away. Fast execution of profit-take/loss-cut orders is built-in. Seamless with Pandas.

A simple tool that lets you know when you are out of Lost Ark's queues
A simple tool that lets you know when you are out of Lost Ark's queues

Overview A simple tool that lets you know when you are out of Lost Ark's queues. You can be notified via: Sound: the app will play a sound Discord web

ghotok mail - lets you find available contact email addresses from target website
ghotok mail - lets you find available contact email addresses from target website

ghotok-mail ghotok mail - lets you find available contact email addresses from target website git clone https://github.com/josifkhan/ghotok-mail cd gh

Flake8 plugin to find commented out or dead code
Flake8 plugin to find commented out or dead code

flake8-eradicate flake8 plugin to find commented out (or so called "dead") code. This is quite important for the project in a long run. Based on eradi

Passive TCP/IP Fingerprinting Tool. Run this on your server and find out what Operating Systems your clients are *really* using.

Passive TCP/IP Fingerprinting This is a passive TCP/IP fingerprinting tool. Run this on your server and find out what operating systems your clients a

Way find out if DNS is down or your instance
Way find out if DNS is down or your instance

DNS-PING Way to find out if DNS is down or your instance Problem: At times it happens that DNS provider services of a website URL is down and so to re

Comments
  • bot deployed to heroku doesn't work, error with bot token format or something similar with config (need config example)

    bot deployed to heroku doesn't work, error with bot token format or something similar with config (need config example)

    bot deployed to heroku doesn't work, error with bot token format or something similar with config (need config example)

    • deployed to heroku
    • bot created using @BotFather (token mask something like this token = os.environ.get('5337.....60:AAE2.....YLq7c') (only without dots for sure)
    • log: heroku logs --tail TypeError: 'NoneType' object is not iterable or another problem

    but bot doesn't work

    2022-05-18T21:01:18.695184+00:00 heroku[web.1]: Starting process with command `python3 bot.py`
    2022-05-18T21:01:20.535054+00:00 app[web.1]: Traceback (most recent call last):
    2022-05-18T21:01:20.535078+00:00 app[web.1]: File "/app/bot.py", line 11, in <module>
    2022-05-18T21:01:20.535185+00:00 app[web.1]: from whoisbot.callbacks import gatekeep_callback, remove_users_callback,\
    2022-05-18T21:01:20.535187+00:00 app[web.1]: File "/app/whoisbot/callbacks.py", line 4, in <module>
    2022-05-18T21:01:20.535263+00:00 app[web.1]: from .base import new_chat, new_user, \
    2022-05-18T21:01:20.535271+00:00 app[web.1]: File "/app/whoisbot/base.py", line 3, in <module>
    2022-05-18T21:01:20.535344+00:00 app[web.1]: from .config import chats, users, bot
    2022-05-18T21:01:20.535353+00:00 app[web.1]: File "/app/whoisbot/config.py", line 18, in <module>
    2022-05-18T21:01:20.535424+00:00 app[web.1]: bot = Bot(token)
    2022-05-18T21:01:20.535436+00:00 app[web.1]: File "/app/.heroku/python/lib/python3.10/site-packages/telegram/bot.py", line 191, in __init__
    2022-05-18T21:01:20.535560+00:00 app[web.1]: self.token = self._validate_token(token)
    2022-05-18T21:01:20.535571+00:00 app[web.1]: File "/app/.heroku/python/lib/python3.10/site-packages/telegram/bot.py", line 350, in _validate_token
    2022-05-18T21:01:20.535750+00:00 app[web.1]: if any(x.isspace() for x in token):
    2022-05-18T21:01:20.535780+00:00 app[web.1]: TypeError: 'NoneType' object is not iterable
    2022-05-18T21:01:20.759209+00:00 heroku[web.1]: Process exited with status 1
    2022-05-18T21:01:20.804964+00:00 heroku[web.1]: State changed from starting to crashed
    2022-05-18T21:01:20.808413+00:00 heroku[web.1]: State changed from crashed to starting
    2022-05-18T21:01:24.692119+00:00 heroku[web.1]: Starting process with command `python3 bot.py`
    2022-05-18T21:01:25.000000+00:00 app[api]: Build succeeded
    2022-05-18T21:01:27.013194+00:00 app[web.1]: Traceback (most recent call last):
    2022-05-18T21:01:27.013211+00:00 app[web.1]: File "/app/bot.py", line 11, in <module>
    2022-05-18T21:01:27.013306+00:00 app[web.1]: from whoisbot.callbacks import gatekeep_callback, remove_users_callback,\
    2022-05-18T21:01:27.013309+00:00 app[web.1]: File "/app/whoisbot/callbacks.py", line 4, in <module>
    2022-05-18T21:01:27.013371+00:00 app[web.1]: from .base import new_chat, new_user, \
    2022-05-18T21:01:27.013381+00:00 app[web.1]: File "/app/whoisbot/base.py", line 3, in <module>
    2022-05-18T21:01:27.013442+00:00 app[web.1]: from .config import chats, users, bot
    2022-05-18T21:01:27.013453+00:00 app[web.1]: File "/app/whoisbot/config.py", line 18, in <module>
    2022-05-18T21:01:27.013514+00:00 app[web.1]: bot = Bot(token)
    2022-05-18T21:01:27.013530+00:00 app[web.1]: File "/app/.heroku/python/lib/python3.10/site-packages/telegram/bot.py", line 191, in __init__
    2022-05-18T21:01:27.013631+00:00 app[web.1]: self.token = self._validate_token(token)
    2022-05-18T21:01:27.013641+00:00 app[web.1]: File "/app/.heroku/python/lib/python3.10/site-packages/telegram/bot.py", line 350, in _validate_token
    2022-05-18T21:01:27.013872+00:00 app[web.1]: if any(x.isspace() for x in token):
    2022-05-18T21:01:27.013926+00:00 app[web.1]: TypeError: 'NoneType' object is not iterable
    2022-05-18T21:01:27.282739+00:00 heroku[web.1]: Process exited with status 1
    2022-05-18T21:01:27.364370+00:00 heroku[web.1]: State changed from starting to crashed
    2022-05-18T21:02:48.763234+00:00 heroku[router]: at=error code=H10 desc="App crashed" method=GET path="/" host=whoisbotmy.herokuapp.com request_id=84b52fc5-a65c-452e-a38f-77f2c363d62c fwd="78.162.147.110" dyno= connect= service= status=503 bytes= protocol=https
    2022-05-18T21:02:50.256201+00:00 heroku[router]: at=error code=H10 desc="App crashed" method=GET path="/favicon.ico" host=whoisbotmy.herokuapp.com request_id=f905210c-ca3e-424d-9a64-ac1dd53d5777 fwd="IP" dyno= connect= service= status=503 bytes= protocol=https
    
    opened by developerisnow 1
Owner
Kirill Nikolaev
Kirill Nikolaev
DomainMonitor is a web project that has a RESTful API to get a domain's subdomains and whois data.

DomainMonitor is a web project that has a RESTful API to get a domain's subdomains and whois data.

null 2 Feb 5, 2022
Bandit is a tool designed to find common security issues in Python code.

A security linter from PyCQA Free software: Apache license Documentation: https://bandit.readthedocs.io/en/latest/ Source: https://github.com/PyCQA/ba

Python Code Quality Authority 4.8k Dec 31, 2022
A Python tool to automate some dorking stuff to find information disclosures.

WebDork v1.0.3 A open-source tool to find publicly available sensitive information about Companies/Organisations! WebDork A Python tool to automate so

Rahul rc 123 Jan 8, 2023
Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their email addresses 🕵️

Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their email addresses. This program also alerts you to the presence of a data leak for the found emails.

null 1.1k Aug 24, 2021
A Tool to find subdomains from hackerone reports.

Hactivity A Tool to find subdomains from Hackerone reports of a given company or a search term (xss, ssrf, etc). It can also print out URL and Title o

Stinger 15 Jul 24, 2022
Yuyu Scanner is a Web Reconnaissance & Web Analysis Scanner to find assets and information about targets.

Yuyu Scanner Yuyu Scanner is a Web Reconnaissance & Web Analysis Scanner to find assets and information about targets. installation ! run as root

Justakazh 20 Nov 24, 2022
Find existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve cat's job! 🐱🔎 📬

mailcat The only cat who can find existing email addresses by nickname. Usage First install requirements: pip3 install -r requirements.txt Then just

null 282 Dec 30, 2022
Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service

Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service. This tool can help a digital forensic investigator to know the context, origin of specific files during a digital forensic investigation.

hashlookup 96 Dec 20, 2022
NexScanner is a tool which allows you to scan a website and find the admin login panel and sub-domains

NexScanner NexScanner is a tool which helps you scan a website for sub-domains and also to find login pages in the website like the admin login panel

null 8 Sep 3, 2022
DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE

DepFine DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE Installation: You Can inst

Hossam mesbah 14 Nov 11, 2022