Jager Logo

Jager

0
Free
Visit Website

Jager is a tool for pulling useful IOCs (indicators of compromise) out of various input sources (PDFs for now, plain text really soon, webpages eventually) and putting them into an easy to manipulate JSON format. Short Comings: - Doesn't do OCR, so CrowdStrike's 'Images only' PDFs don't work well. - Text analysis feature is planned for OCR by hand. - Regex's need improvement for better performance. - Some manual work needed for group names or attribution. Use: To analyze a PDF: python jager.py -i foo.pdf -o bar.json To analyze a directory of PDFs: python jager.py -d ~/foo -o ~/bar Features for the Future: - New Analysis Modes - Webpages - Plain Text - New Indicator Types: URLs, File Paths, Registry Keys - More Useful Output

FEATURES

ALTERNATIVES

VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.

Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.

Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.

A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.

Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.

A collection of public YARA signatures for various malware families.

The FASTEST Way to Consume Threat Intelligence and make it actionable.

A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.