iocextract Logo

iocextract

0
Free
Visit Website

iocextract Indicator of Compromise (IOC) extractor for some of the most commonly ingested artifacts. Overview The Problem Our Solution Example Use Case Installation Usage Library Command Line Interface Helpful Information FAQ More Details Custom Regex Related Projects Contributing Overview The iocextract package is a library and command line interface (CLI) for extracting URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora. It allows for you to extract encoded and "defanged" IOCs and optionally decode or refang them. The Problem It is common practice for malware analysts or endpoint software to "defang" IOCs such as URLs and IP addresses, in order to prevent accidental exposure to live malicious content. Being able to extract and aggregate these IOCs is often valuable for analysts. Unfortunately, existing "IOC extraction" tools often pass right by them, as they are not caught by standard regex. For example, the simple defanging technique of surrounding periods with brackets: 127[.]0[.]0[.]1 Existing tools that use a simple IP address regex will ignore this IOC entirely. Our Solution By combining specially crafted regex with some careful consideration of the problem, we can effectively extract these IOCs.

FEATURES

ALTERNATIVES

A tool for searching a Git repository for interesting content

A powerful tool for detecting and identifying malware using a rule-based system.

A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.

Yabin creates Yara signatures from malware to find similar samples.

A tool that reveals invisible links within JavaScript files

A tool to dump ODIN3 messages into files for reverse-engineering

Collection of slides, materials, demos, crackmes, and writeups from r2con-2017 conference.

Powerful debugging tool with extensive features and extensions for memory dump analysis and crash dump analysis.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved