Hostintel Logo

Hostintel

0
Free
Visit Website

This tool is used to collect various intelligence sources for hosts. Hostintel is written in a modular fashion so new intelligence sources can be easily added. Hosts are identified by FQDN host name, Domain, or IP address. This tool only supports IPv4 at the moment. The output is in CSV format and sent to STDOUT so the data can be saved or piped into another program. Since the output is in CSV format, spreadsheets such as Excel or database systems will easily be able to import the data. This tool works with Python v2 and Python v3. If you find it does not work with Python v3, please post an issue.

FEATURES

ALTERNATIVES

NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.

A Pythonic framework for automated threat modeling shifting left.

A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.

A collection of YARA rules for research and hunting purposes.

Tools to export data from MISP MySQL database for post-incident analysis and correlation.

A threat intelligence dissemination layer for open-source security tools with STIX-2 support and plugin-based architecture.

ONYPHE is a cyber defense search engine that discovers exposed assets and provides real-time monitoring to identify vulnerabilities and potential risks.

Hippocampe is a threat feed aggregator with configurable confidence levels and a Hipposcore for determining maliciousness.

PINNED