Forager Logo

Forager

0
Free
Visit Website

Do you ever wonder if there is an easier way to retrieve, store, and maintain all your threat intelligence data? Random user, meet Forager. Not all threat intel implementations require a database that is 'correlating trillions of data points..' and instead, you just need a simple interface, with simple TXT files, that can pull threat data from other feeds, PDF threat reports, or other data sources, with minimal effort. With 15 pre-configured threat feeds, you can get started with threat intelligence feed management today.. Right now.. Do it! Features At A Glance: - Fetch intel from URL's using modular feed functions - Extract domain, md5, sha1, sha256, IPv4, and YARA indicators - Search through the current intel set by single IP or with an IOC file - Generate JSON feeds for consumption by CarbonBlack - Serves up a Simple HTTP JSON feed server for CarbonBlack Requirements: Requires Python 3! argparse xlrd pdfminer3k colorama (for pretty colored output) You can install all requirements with the included requirements.txt file pip3 install -r requirements.txt Feeds: --feeds list -- Lists all feeds and allows the user to choose a single feed to update. update -- Updates all feed modules

FEATURES

ALTERNATIVES

Repository with projects for photo and video hashing, content moderation, and signal exchange.

ProcFilter is a process filtering system for Windows with built-in YARA integration, designed for malware analysts to create YARA signatures for Windows environments.

A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.

Check the reputation of an IP address to identify potential threats.

Real-time monitoring tool for newly issued SSL certificates.

A PowerShell script to interact with the MITRE ATT&CK Framework via its own API using the deprecated MediaWiki API.

Create deceptive webpages to deceive and redirect attackers away from real websites by cloning them.

A library of Amazon S3 attack scenarios with mitigation strategies.

PINNED