Parse indicators of compromise (also known as "observables" or "network data" - e.g. urls, email addresses, etc) from text. Documentation (it's interactive!) I'm looking for sponsorship for this project. I have a number of improvements and helpful features I'd like to add and would appreciate some support as I invest this time and focus. If you use this project for in a commercial capacity and/or find it useful, please consider contributing even a small amount. Thanks!
Common questions about IOC Finder including features, pricing, alternatives, and user reviews.
IOC Finder is Parse IOCs from text. It is a Threat Management solution designed to help security teams with IOC.
IOC Finder is a free Threat Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/fhightower/ioc-finder/ for download and installation instructions.
Popular alternatives to IOC Finder include:
Compare these tools and more at https://cybersectools.com/categories/threat-management
IOC Finder is for security teams and organizations that need IOC. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Threat Management tools can be found at https://cybersectools.com/categories/threat-management
Cybercrime intelligence tools for searching compromised credentials from infostealers
Threat intelligence platform combining Google, Mandiant, and VirusTotal data