
Go Roast
par jarocki
Decode and analyze Interactsh OAST domain metadata for threat intelligence and campaign tracking.
What it does
Go Roast is a specialized utility for processing Out-of-band Application Security Testing (OAST) domains, specifically those from Interactsh. It decodes the XID preamble to extract timestamps, machine IDs, process IDs, and counters, allowing security researchers to correlate threat intelligence and track attacker campaigns.
Tools
decode_oast: Decodes one or more OAST domains to extract metadata.extract_oast: Extracts OAST domains from raw text or logs.extract_oast_file: Extracts OAST domains from a specified file.validate_oast: Validates if a string is a legitimate OAST domain.oast_campaign_analysis: Generates a comprehensive campaign analysis summary in markdown.fetch_interactsh_domains_live: Fetches current Interactsh domains from threat intel sources.fetch_burp_collaborator_domains_live: Fetches current Burp Collaborator domains.check_domain_updates: Checks for updates to domain lists using HEAD requests.validate_domain_advanced: Provides advanced validation with organizational attribution.
Installation
Add the following to your claude_desktop_config.json:
{
"mcpServers": {
"roast": {
"command": "/path/to/roast",
"args": ["mcp"]
}
}
}
Supported hosts
- Claude Desktop
Installation rapide
go install codeberg.org/hrbrmstr/go-roast/cmd/roast@latestInformations
- Tarification
- free
- Publié






