alive-url-scan
AI-powered URL threat analysis platform using n8n automation and Playwright MCP browser operator
GitHub Stars
0
User Rating
Not Rated
Forks
0
Issues
0
Views
0
Favorites
0
š Alive URL Scan
A tool I built to automate URL threat analysis using AI
Tired of manually checking suspicious URLs from phishing feeds? I created this automation tool that combines n8n workflows, AI analysis, and automated screenshots to do the heavy lifting for you. It's a personal project for my portfolio, but I hope it helps other cybersecurity folks speed up their URL analysis workflows.
šÆ The Problem I'm Solving
After spending way too much time manually analyzing suspicious URLs, I realized we all face the same frustrations:
- ā° Manual analysis is slow - Checking URLs one by one eats up your entire day
- šÆ Easy to miss the sneaky stuff - Sophisticated phishing slips past basic keyword filters
- š Drowning in data - Thousands of URLs from feeds with no good way to prioritize
- š Repetitive workflows - Same steps over and over for every URL
- š Keywords aren't enough - You need to understand context, not just match patterns
š” What I Built
So I built Alive URL Scan to automate all the tedious stuff:
⨠AI Does the Analysis - Google Gemini LLM actually understands what websites are trying to do
š¤ Workflows Handle Everything - n8n orchestrates the entire pipeline automatically
šø Screenshots for Evidence - Playwright grabs visual proof of what you found
š³ Easy Setup - Just run docker compose up -d
and you're analyzing URLs
š Scales When Needed - Queue system handles hundreds of URLs without breaking
š„ Who Might Find This Useful
If you're dealing with suspicious URLs regularly, this might help:
- š”ļø Security Analysts - Stop clicking through URLs manually
- šµļø OSINT Folks - Collect screenshots and evidence automatically
- š” Threat Intel Teams - Process large feeds without losing your mind
- š£ Phishing Hunters - Spot brand impersonation and targeted attacks
- šļø SOC Analysts - Speed up your incident response workflows
- š”ļø Brand Protection - Monitor and document abuse cases
- š Bug Bounty Hunters - Automate reconnaissance on suspicious domains
š Quick Start
One-Command Deployment
# Clone the repository
git clone https://github.com/brunosergi/alive-url-scan.git
cd alive-url-scan
# Configure environment
cp .env.example .env
# Edit .env with your API keys (Google Gemini required)
# Launch the entire platform
docker compose up -d
That's it! š You're now running your own URL analysis automation.
Access Your Services
- šļø n8n Workflow Editor: http://localhost:5678
- š Dashboard Interface: http://localhost:5678/webhook/dashboard
- šļø Supabase: http://localhost:8000
- š„ļø Test VNC: http://localhost:6080 - Watch browser automation in real-time via VNC
š ļø What's Under the Hood
Core Tools
- n8n - Visual workflows that connect everything together
- Supabase - Backend PostgreSQL database with real-time updates
- Playwright MCP - Playwright MCP Server for AI-controlled browser automation with VNC access
- Docker - Everything runs in containers
AI Stuff
- Google Gemini - The LLM that actually analyzes content
- Structured Prompts - Custom prompts focused on finding threats
- JSON Parsing - Clean outputs that work with other tools
š How It Works
- š„ Upload URLs - Drop files with URLs (can be raw files, the app automatically cleans and extracts only URLs)
- š¤ AI Analysis - Gemini uses Playwright MCP to looks at each URL and figures out what's going on, then grabs a picture for evidence
- š„ļø Watch Live - The VNC interface runs a full Chrome browser where you can see exactly what the AI agent sees
- š¾ Store Results - Everything gets saved to the database with metadata
- š View Dashboard - See results in real-time as they complete
- š¤ Export Data - Download as CSV, JSON, or whatever format you need
ā Star this repo if you find it useful!
š Setup Guide ⢠š£ļø Roadmap ⢠āļø Workflows
Just a guy building tools for the cybersecurity community š”ļø
6
Followers
16
Repositories
0
Gists
3
Total Contributions