Jager Logo

Jager

0
Free
Updated 11 March 2025
Visit Website

Jager is a tool for pulling useful IOCs (indicators of compromise) out of various input sources (PDFs for now, plain text really soon, webpages eventually) and putting them into an easy to manipulate JSON format. Short Comings: - Doesn't do OCR, so CrowdStrike's 'Images only' PDFs don't work well. - Text analysis feature is planned for OCR by hand. - Regex's need improvement for better performance. - Some manual work needed for group names or attribution. Use: To analyze a PDF: python jager.py -i foo.pdf -o bar.json To analyze a directory of PDFs: python jager.py -d ~/foo -o ~/bar Features for the Future: - New Analysis Modes - Webpages - Plain Text - New Indicator Types: URLs, File Paths, Registry Keys - More Useful Output

FEATURES

SIMILAR TOOLS

Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.

A database of Tor exit nodes with their corresponding IP addresses and timestamps.

Bearded Avenger is a cybersecurity tool with various integrations and deployment instructions available.

Check the reputation of an IP address to identify potential threats.

CLI tool for ThreatCrowd.org with multiple query functions.

A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.

A comprehensive and unrestricted dataset of security incidents for research and decision-making

Intelligence feeds for cybersecurity professionals to stay informed about emerging threats and trends.

Facilitates distribution of Threat Intelligence artifacts to defensive systems.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved