Combine gathers Threat Intelligence Feeds from publicly available sources. You can run the core tool with combine.py: - usage: combine.py [-h] [-t TYPE] [-f FILE] [-d] [-e] [--tiq-test] - optional arguments: -h, --help show this help message and exit -t TYPE, --type TYPE Specify output type. Currently supported: CSV and exporting to CRITs -f FILE, --file FILE Specify output file. Defaults to harvest.FILETYPE -d, --delete Delete intermediate files -e, --enrich Enrich data --tiq-test Output in tiq-test format (implies -e) Alternately, you can run each phase individually: - python reaper.py - python thresher.py - python winnower.py - python baler.py The output will actually be a CSV with the following schema: - entity, type, direction, source, notes, date The entity field consists of a FQDN or IPv4 address (supported entities at the moment) The type field consists of either FQDN or IPv4, classifying the type of the entity The direction field will be either inbound or outbound The source field contains the original URL The notes field should cover any extra tag info we may want to persist with the data The date field will be in YYYY-MM-DD format. All fields are quoted with double-quotes (")
Common questions about Combine including features, pricing, alternatives, and user reviews.
Combine is Gathers Threat Intelligence Feeds from publicly available sources and provides detailed output in CSV format. It is a Threat Management solution designed to help security teams with Threat Feed, Osint, Cyber Threat Intelligence.
Combine is a free Threat Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/mlsecproject/combine/ for download and installation instructions.
Popular alternatives to Combine include:
Compare all Combine alternatives at https://cybersectools.com/alternatives/combine
Combine is for security teams and organizations that need Threat Feed, Osint, Cyber Threat Intelligence. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Threat Management tools can be found at https://cybersectools.com/categories/threat-management
Head-to-head feature, pricing, and rating breakdowns.
Cybercrime intelligence tools for searching compromised credentials from infostealers