Jager Logo

Jager

0
Free
Visit Website

Jager is a tool for pulling useful IOCs (indicators of compromise) out of various input sources (PDFs for now, plain text really soon, webpages eventually) and putting them into an easy to manipulate JSON format. Short Comings: - Doesn't do OCR, so CrowdStrike's 'Images only' PDFs don't work well. - Text analysis feature is planned for OCR by hand. - Regex's need improvement for better performance. - Some manual work needed for group names or attribution. Use: To analyze a PDF: python jager.py -i foo.pdf -o bar.json To analyze a directory of PDFs: python jager.py -d ~/foo -o ~/bar Features for the Future: - New Analysis Modes - Webpages - Plain Text - New Indicator Types: URLs, File Paths, Registry Keys - More Useful Output

FEATURES

ALTERNATIVES

A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.

A project focusing on understanding and combating threats to the Internet economy and net citizens.

A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.

A curated collection of Sigma & Yara rules and Indicators of Compromise (IOCs) for threat detection and malware identification.

HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.