Cacador is a tool for extracting common indicators of compromise from a block of text. The easiest way to get cacador is to download the latest release for your platform. Compiling Cacador: Install golang go get github.com/sroberts/cacador Compile with go build Running: Run with ./cacador. It accepts text from stdin and writes a JSON blob of IOCs to stdout. For example: cat text.txt | ./cacador | import where text is some IOC rich text and import pushes your new IOCs into your threat management system. Cacador does recognize two command line flags: - comment="Foo" which makes it possible to leave a note as metadata. - tags="Foo, bar, baz" which adds tags. Generating a new release: Install goreleaser via go get github.com/goreleaser/goreleaser. Push your branch to GitHub. Tag it via git tag -a v1.0.3 -m "Release 1.0.3 - Minor bugfix edition." Push the tag to GitHub via git push origin v1.0.3 Ensure you have a GITHUB_TOKEN env var set. Run goreleaser. Why? Other tools for doing indicator extraction are pretty awesome (like armbues/ioc_parser or sroberts/jager), but what's nice about cacador is you can use it to extract IOCs from text files.
Common questions about Cacador including features, pricing, alternatives, and user reviews.
Cacador is A tool for extracting common indicators of compromise from a block of text. It is a Threat Management solution designed to help security teams with IOC.
Cacador is a free Threat Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/sroberts/cacador/ for download and installation instructions.
Popular alternatives to Cacador include:
Compare all Cacador alternatives at https://cybersectools.com/alternatives/cacador
Cacador is for security teams and organizations that need IOC. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Threat Management tools can be found at https://cybersectools.com/categories/threat-management
Head-to-head feature, pricing, and rating breakdowns.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Threat intelligence platform combining Google, Mandiant, and VirusTotal data