IOCextractor is a program to help extract IOCs from text files. It identifies MD5 hashes, IPv4 addresses, domains, URLs, and email addresses. It uses regular expressions to identify potential IOCs and highlights them for user review. It requires TkInter and ioc_writer library for OpenIOC exporting. It is compatible with Python 2.7 and tested on Windows 7, Mac OS 10.8.4, and Ubuntu 13.04. It also requires python-cybox >= 2.0.1.0 for CybOX exporting.
FEATURES
ALTERNATIVES
PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.
A powerful tool for identifying and exploiting Cross-Site Scripting (XSS) vulnerabilities.
A malware processing and analytics tool that utilizes Pig, Django, and Elasticsearch to analyze and visualize malware data.
Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.
Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Kriptos
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.