IP information for NSOC teams. Koala was written at Cemig's Network and Security Operations Center (Centro de Operações de Rede e Segurança -- CORS) to assist the team in cybersecurity investigations and network management.
Koala comes with the following modules:
subnet
: performs basic IP subnet calculations.whois
: discover many information about an IP address.proxy
: sets OS proxy according to configuration file. currently works only with Windowsvisio
: converts MS-Visio files to PDF or HTML ones. only works with Windowsabuse
: analyses an abuse box to retrieve header information of messages. under developmentiron
: clean up a proxy domain list. IronPort compliantqradar
: performs predefined AQL queries in IBM QRadar.sync
: syncs information between 2 systems (today: Prime to NetBox).
First, clone Koala and install its Python dependencies:
$ git clone https://github.com/forkd/koala
$ cd koala
$ python -m pip install -r requirements.txt
$ cd koala
The list of commands follows:
$ koala.py subnet 10.10.56.32/22
$ koala.py whois 888.888.888.888
$ koala.py proxy proxy_id
$ koala.py visio
$ koala.py abuse
$ koala.py iron -i domain_list.txt -o new.txt
$ koala.py qradar query1
$ koala.py sync p2n
Licensed under a MIT license --read LICENSE
file for further information.