Jager Logo

Jager

A tool for extracting IOCs from various input sources and converting them into JSON format.

Visit Website
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Jager Description

Jager is a tool for pulling useful IOCs (indicators of compromise) out of various input sources (PDFs for now, plain text really soon, webpages eventually) and putting them into an easy to manipulate JSON format. Short Comings: - Doesn't do OCR, so CrowdStrike's 'Images only' PDFs don't work well. - Text analysis feature is planned for OCR by hand. - Regex's need improvement for better performance. - Some manual work needed for group names or attribution. Use: To analyze a PDF: python jager.py -i foo.pdf -o bar.json To analyze a directory of PDFs: python jager.py -d ~/foo -o ~/bar Features for the Future: - New Analysis Modes - Webpages - Plain Text - New Indicator Types: URLs, File Paths, Registry Keys - More Useful Output

Jager FAQ

Common questions about Jager including features, pricing, alternatives, and user reviews.

Jager is A tool for extracting IOCs from various input sources and converting them into JSON format.. It is a Threat Management solution designed to help security teams with IOC.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Google Threat Intelligence Logo

Threat intelligence platform combining Google, Mandiant, and VirusTotal data

0
Feedly Threat Intelligence Logo

AI-powered platform for collecting and analyzing open source threat intelligence

0
Bitsight Cybersixgill Logo

Cyber threat intelligence platform for monitoring threats, TTPs, and IOCs

0
KELA Technical Cybercrime Intelligence Logo

Technical threat intel feed of compromised IPs/domains from cybercrime sources

0
HYAS Insight Logo

Infrastructure intelligence platform for threat hunting and investigation

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox