Harbinger Logo

Harbinger

0
Free
Visit Website

Harbinger is a threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon. It can also be used in file analysis mode or single item mode. Usage: harbinger.py [-h] [-i IP] [-d DOMAIN] [-a HASH] [-fd FILE_DOMAIN] [-fi FILE_IP] [-fh FILE_HASH] [--api API] [--vtapi VTAPI] Threat Intelligence usage: harbinger.py [-h] [-i IP] [-d DOMAIN] [-a HASH] [-fd FILE_DOMAIN] [-fi FILE_IP] [-fh FILE_HASH] [--api API] [--vtapi VTAPI] optional arguments: -h, --help show this help message and exit -i IP, --ip IP ip address to check -d DOMAIN, --domain DOMAIN domain to check -a HASH, --hash HASH hash to check -fd FILE_DOMAIN, --file-domain FILE_DOMAIN file with domain list to check. One per line. -fi FILE_IP, --file-ip FILE_IP file with ip list to check. One per line. -fh FILE_HASH, --file-hash FILE_HASH file with hash list to check. One per line. --api API API key to use --vtapi VTAPI VT API key to use

FEATURES

ALTERNATIVES

A free and open-source OSINT framework for gathering and analyzing data from various sources

Aggregator of FireHOL IP lists with HTTP-based API service and Python client package.

Collection of Yara rules for file identification and classification

A modular malware collection and processing framework with support for various threat intelligence feeds.

Tool for managing Yara rules on VirusTotal

Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.

ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring.

A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

PINNED