| Follow @lancinimarco

Reading time ~1 minute

Robtex-Go: Go Client for the Robtex API

While automating some aspects of my OSINT (Open-source Intelligence) process, I realised there was no Go client for the Robtex API, so I decided to create one.

Robtex-Go is a library that provides a little wrapper over such APIs, and can be quickly integrated in any other Go codebase:

package main

import (
	"fmt"
	"github.com/marco-lancini/robtex-go/robtex"
)

func main() {

	client := robtex.NewClient("https://freeapi.robtex.com", "")

	ipInfo := client.IpQuery("8.8.8.8")
	fmt.Println(ipInfo)

	asn := client.AsQuery(1234)
	fmt.Println(asn)

	passiveDns := client.PassiveDNS("www.google.com")
	fmt.Println(passiveDns)
}

Installation and usage instructions can be found on Github.

Robtex-Go can be found on Github: https://github.com/marco-lancini/robtex-go.

Marco Lancini

Marco Lancini
Hi, I'm Marco Lancini. I'm a Security Engineer, mainly interested in cloud native technologies, devops, and network security...  

Currently Working On

Currently, my areas of focus are two: cloud native tech and red teaming. Here is a short list of what I’m currently working on in my spare time.

  1. Cloud Native Tech
    • Cloud Security (AWS, Azure, GCP)
    • Container Security (docker, kubernetes)
      1. So I Heard You Want to Learn Kubernetes -- An attempt to demystify the perception by which Kubernetes is believed to be too hard to even get started, by walking through the journey I undertook to get the basics first, and later to focus on the security aspects.
      2. My Arsenal of Cloud Native (Security) Tools -- A curated list of (security) tools that can help assessing the security of AWS, Docker, Kubernetes, and even Git repositories.
    • Infrastructure-as-Code (Consul, Vault, Packer, Terraform, Ansible)
      1. Docker + Consul + Vault: A Practical Guide -- How to use docker-compose to spin up a Vault instance backed by Consul.
      2. Offensive Infrastructure with Modern Technologies -- An N-part blog post series, to record my journey and the lessons learned while building a secure, disposable, and completely automated infrastructure to be used in offensive operations.
  2. Red Teaming
    • Techniques
      1. Red Teaming Mind Map from The Hacker Playbook 3 -- A high-level mind map to summarize all the techniques/tools covered by Peter Kim’s book.
    • Tooling
      1. Offensive ELK -- Custom Elasticsearch setup, aiming to show how traditional defensive tools can be effectively used for offensive security data analysis, helping your team collaborate and triage scan results.
      2. GoScan -- An interactive network scanner client, featuring auto-completion, which provides abstraction and automation over nmap.
      3. Robtex-Go -- A library that provides a little wrapper over such APIs, and can be quickly integrated in any other Go codebase.
Continue reading