AIL Framework Logo

AIL Framework

0
Free
1 saves
Updated 06 August 2025
Visit Website

AIL (Analysis of Information Leaks) Framework is an open-source tool designed to analyze potential information leaks from unstructured data sources. It processes data from various sources, including pastes and data streams, to identify sensitive information. Key features include: - Modular architecture for handling structured and unstructured data - Support for external ZMQ feeds - URL detection and geolocation - Credit card number and credential leak detection - Email address extraction and validation - Tor .onion address extraction - Full-text indexing - YARA rule matching and retro-hunting - Decoding of encoded files - API key detection (AWS, Google) - Cryptocurrency address detection - Tagging system with MISP Galaxy and Taxonomies - Integration with MISP and TheHive for sharing threat intelligence - Correlation engine for visualizing relationships between extracted data - Web crawler for websites, forums, and Tor hidden services - Domain availability monitoring

FEATURES

SIMILAR TOOLS

A proof of concept for using the SSM Agent in Fargate for incident response

A security analytics platform that integrates with Google Chronicle to deliver Autonomic Security Operations through data engineering, detection engineering, and response engineering.

Open-source security automation platform for automating security alerts and building AI-assisted workflows.

Repository of templates for Ayehu's workflows with the ability to design, execute, and automate IT and business processes.

Migrated Splunk SOAR Connectors to new GitHub organization for better organization and management.

Incident response and case management solution for efficient incident response and management.

A cybersecurity and privacy playbook management platform that enables teams to create, store, share, and implement standardized security procedures through a no-code interface.

Metadata repository with installation tools and cloud provider support.

Malware allows attackers to execute Windows commands from a remote environment

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved