Harbinger is a threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon. It can also be used in file analysis mode or single item mode. Usage: harbinger.py [-h] [-i IP] [-d DOMAIN] [-a HASH] [-fd FILE_DOMAIN] [-fi FILE_IP] [-fh FILE_HASH] [--api API] [--vtapi VTAPI] Threat Intelligence usage: harbinger.py [-h] [-i IP] [-d DOMAIN] [-a HASH] [-fd FILE_DOMAIN] [-fi FILE_IP] [-fh FILE_HASH] [--api API] [--vtapi VTAPI] optional arguments: -h, --help show this help message and exit -i IP, --ip IP ip address to check -d DOMAIN, --domain DOMAIN domain to check -a HASH, --hash HASH hash to check -fd FILE_DOMAIN, --file-domain FILE_DOMAIN file with domain list to check. One per line. -fi FILE_IP, --file-ip FILE_IP file with ip list to check. One per line. -fh FILE_HASH, --file-hash FILE_HASH file with hash list to check. One per line. --api API API key to use --vtapi VTAPI VT API key to use
Common questions about Harbinger including features, pricing, alternatives, and user reviews.
Harbinger is A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon. It is a Threat Management solution designed to help security teams with Cyber Threat Intelligence.
Harbinger is a free Threat Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/exp0se/harbinger/ for download and installation instructions.
Popular alternatives to Harbinger include:
Compare all Harbinger alternatives at https://cybersectools.com/alternatives/harbinger
Harbinger is for security teams and organizations that need Cyber Threat Intelligence. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Threat Management tools can be found at https://cybersectools.com/categories/threat-management
Head-to-head feature, pricing, and rating breakdowns.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Real-time OSINT monitoring for leaked credentials, data, and infrastructure