Do you ever wonder if there is an easier way to retrieve, store, and maintain all your threat intelligence data? Random user, meet Forager. Not all threat intel implementations require a database that is 'correlating trillions of data points..' and instead, you just need a simple interface, with simple TXT files, that can pull threat data from other feeds, PDF threat reports, or other data sources, with minimal effort. With 15 pre-configured threat feeds, you can get started with threat intelligence feed management today.. Right now.. Do it! Features At A Glance: - Fetch intel from URL's using modular feed functions - Extract domain, md5, sha1, sha256, IPv4, and YARA indicators - Search through the current intel set by single IP or with an IOC file - Generate JSON feeds for consumption by CarbonBlack - Serves up a Simple HTTP JSON feed server for CarbonBlack Requirements: Requires Python 3! argparse xlrd pdfminer3k colorama (for pretty colored output) You can install all requirements with the included requirements.txt file pip3 install -r requirements.txt Feeds: --feeds list -- Lists all feeds and allows the user to choose a single feed to update. update -- Updates all feed modules
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
FraudGuard is a service that provides real-time internet traffic analysis and IP tracking to help validate usage and prevent fraud.
A project sharing malicious URLs used for malware distribution to help protect networks.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.
In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.
A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.
Malware Patrol offers a range of threat intelligence solutions, including enterprise data feeds, DNS firewall, phishing threat intelligence, and small business protection.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.