INFRAISLAND SOC COMMAND CENTER
Blue Team & Incident Response — One-Click Tools
⚠ For authorized use only. All actions are logged. Ensure you have written permission before scanning external targets.
WHOIS
Domain/IP registration
DNS Lookup
A, MX, TXT, CNAME records
Port Scan
Nmap-powered scanner
IOC Extract
IPs, URLs, hashes, CVEs
Hash Tools
MD5, SHA1, SHA256, SHA512
SSL Inspector
Cert chain & cipher
Log Analyzer
Parse & triage logs
IR Timeline
Build incident chronology
Encode/Decode
Base64, URL, Hex, ROT13
CVE Lookup
MITRE vulnerability details
Sys Snapshot
Processes, conns, logins
Pwd Strength
Password policy checker
TOOL CATEGORIES
OSINT / Reconnaissance5 tools
Network Analysis3 tools
Forensics / Analysis4 tools
Incident Response3 tools
QUICK REFERENCE
✔ No data sent to external services (except GeoIP, CVE, SSL)
✔ All tools run locally on this VM
✔ File hashing stays in-memory only
⚠ Port scans may trigger IDS alerts
⚠ Obtain written authorization first
WHOIS LOOKUP
Domain registration, registrar, abuse contact, NS records
Output
Awaiting input...
DNS LOOKUP
Query A, AAAA, MX, NS, TXT, CNAME, SOA records
Output
Awaiting input...
GEOIP & REVERSE DNS
Geolocation, ASN, reverse hostname resolution
GEO IP LOOKUP
Awaiting input...
REVERSE DNS
Awaiting input...
SSL / TLS INSPECTOR
Certificate details, cipher suite, expiry, SANs
Certificate Details
Awaiting input...
CVE LOOKUP
MITRE CVE database query — description, severity, references
CVE Details
Awaiting input...
PORT SCANNER
Nmap-powered: quick scan, full TCP, UDP, vuln scripts, stealth
⚠ Port scanning without authorization may be illegal. Only scan targets you own or have written permission to test.
Nmap Output
Awaiting input...
PING & TRACEROUTE
ICMP reachability test and hop-by-hop path tracing
PING
Awaiting input...
TRACEROUTE
Awaiting input...
NETWORK INFO
Local interfaces, routing table, ARP cache, active connections
Network Snapshot
Awaiting input...
HASH TOOLS
MD5, SHA1, SHA256, SHA512 — text input or file upload
HASH TEXT
Awaiting input...
HASH FILE
Awaiting file...
ENCODE / DECODE
Base64, URL, Hex, Binary, ROT13
Result
Awaiting input...
IOC EXTRACTOR
Extract IPs, domains, URLs, emails, hashes, CVEs, registry keys
Extracted Indicators
Awaiting input...
LOG ANALYZER
Triage log files — top IPs, error patterns, suspicious activity
Analysis Report
Awaiting input...
INCIDENT RESPONSE TIMELINE
Build a chronological event log for your incident report
Timeline Report
Add events above and click Build Timeline...
SYSTEM SNAPSHOT
Processes, memory, disk, logged-in users, recent logins
Captures: uname, uptime, df, free, ps, who, last
System Snapshot
Awaiting input...
PASSWORD STRENGTH
Policy compliance check — no passwords are transmitted externally
ℹ Password analysis is performed locally in this server only. No data leaves this VM.
—
Analysis
Awaiting input...