AIL (Analysis of Information Leaks) Framework is an open-source tool designed to analyze potential information leaks from unstructured data sources. It processes data from various sources, including pastes and data streams, to identify sensitive information. Key features include: - Modular architecture for handling structured and unstructured data - Support for external ZMQ feeds - URL detection and geolocation - Credit card number and credential leak detection - Email address extraction and validation - Tor .onion address extraction - Full-text indexing - YARA rule matching and retro-hunting - Decoding of encoded files - API key detection (AWS, Google) - Cryptocurrency address detection - Tagging system with MISP Galaxy and Taxonomies - Integration with MISP and TheHive for sharing threat intelligence - Correlation engine for visualizing relationships between extracted data - Web crawler for websites, forums, and Tor hidden services - Domain availability monitoring
FEATURES
SIMILAR TOOLS
RedEye is a visual analytic tool that provides enhanced situational awareness and operational insights for both Red and Blue Team cybersecurity operations.
Shuffle is a platform for automating security workflows with confidence, offering templates, collaboration tools, and a large app library.
JIMI is a flow-based orchestration automation platform that combines low-code and no-code capabilities for multi-team collaboration across IT, security, and development operations.
A community repository of workflow templates for the Ayehu NG platform that enables automated IT and business process execution.
Fast Intercept is a security automation platform that empowers users to maximize their existing security products and automate routine tasks.
A community-driven repository and development framework for creating custom automation activities within the Ayehu NG IT orchestration platform.
Open-source security automation platform for automating security alerts and building AI-assisted workflows.
Cortex XSOAR is a comprehensive SOAR platform that automates and standardizes security processes for faster response times and increased team productivity.
A compilation of suggested tools for each component in a detection and response pipeline, with real-world examples, to design effective threat detection and response pipelines.