Harbinger is a threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon. It can also be used in file analysis mode or single item mode. Usage: harbinger.py [-h] [-i IP] [-d DOMAIN] [-a HASH] [-fd FILE_DOMAIN] [-fi FILE_IP] [-fh FILE_HASH] [--api API] [--vtapi VTAPI] Threat Intelligence usage: harbinger.py [-h] [-i IP] [-d DOMAIN] [-a HASH] [-fd FILE_DOMAIN] [-fi FILE_IP] [-fh FILE_HASH] [--api API] [--vtapi VTAPI] optional arguments: -h, --help show this help message and exit -i IP, --ip IP ip address to check -d DOMAIN, --domain DOMAIN domain to check -a HASH, --hash HASH hash to check -fd FILE_DOMAIN, --file-domain FILE_DOMAIN file with domain list to check. One per line. -fi FILE_IP, --file-ip FILE_IP file with ip list to check. One per line. -fh FILE_HASH, --file-hash FILE_HASH file with hash list to check. One per line. --api API API key to use --vtapi VTAPI VT API key to use
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol, with a focus on incident handling automation and threat intelligence processing.
Malware Patrol offers a range of threat intelligence solutions, including enterprise data feeds, DNS firewall, phishing threat intelligence, and small business protection.
A threat intelligence dissemination layer for open-source security tools with STIX-2 support and plugin-based architecture.
Check the reputation of an IP address to identify potential threats.
A threat intelligence and vulnerability monitoring platform that aggregates security alerts from trusted sources and provides customizable monitoring and notification capabilities.
Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.
Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.
Bearded Avenger is a cybersecurity tool with various integrations and deployment instructions available.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.