AIL (Analysis of Information Leaks) Framework is an open-source tool designed to analyze potential information leaks from unstructured data sources. It processes data from various sources, including pastes and data streams, to identify sensitive information. Key features include: - Modular architecture for handling structured and unstructured data - Support for external ZMQ feeds - URL detection and geolocation - Credit card number and credential leak detection - Email address extraction and validation - Tor .onion address extraction - Full-text indexing - YARA rule matching and retro-hunting - Decoding of encoded files - API key detection (AWS, Google) - Cryptocurrency address detection - Tagging system with MISP Galaxy and Taxonomies - Integration with MISP and TheHive for sharing threat intelligence - Correlation engine for visualizing relationships between extracted data - Web crawler for websites, forums, and Tor hidden services - Domain availability monitoring
FEATURES
SIMILAR TOOLS
A proof of concept for using the SSM Agent in Fargate for incident response
A security analytics platform that integrates with Google Chronicle to deliver Autonomic Security Operations through data engineering, detection engineering, and response engineering.
Open-source security automation platform for automating security alerts and building AI-assisted workflows.
Repository of templates for Ayehu's workflows with the ability to design, execute, and automate IT and business processes.
Migrated Splunk SOAR Connectors to new GitHub organization for better organization and management.
Incident response and case management solution for efficient incident response and management.
A cybersecurity and privacy playbook management platform that enables teams to create, store, share, and implement standardized security procedures through a no-code interface.
Malware allows attackers to execute Windows commands from a remote environment
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.