Machinae is a tool for collecting intelligence from public sites/feeds about various security-related pieces of data: IP addresses, domain names, URLs, email addresses, file hashes and SSL fingerprints. It was inspired by Automater, another excellent tool for collecting information. The Machinae project was born from wishing to improve Automater in 4 areas: - Codebase: Bring Automater to python3 compatibility while making the code more pythonic - Configuration: Use a more human readable configuration format (YAML) - Inputs: Support JSON parsing out-of-the-box without the need to write regular expressions, but still support regex scraping when needed - Outputs: Support additional output types, including JSON, while making extraneous output optional Installation: Machinae can be installed using pip3: pip3 install machinae Or, if you're feeling adventurous, can be installed directly from github: pip3 install git+https://github.com/HurricaneLabs/machinae.git You will need to have whatever dependencies are required on your system for compiling Python modules (on Debian based systems, python3-dev), as well as the libyaml development package (on Debian
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A library of Amazon S3 attack scenarios with mitigation strategies.
A Splunk app mapped to MITRE ATT&CK to guide threat hunts.
A Pythonic framework for automated threat modeling shifting left.
A repository to aid Windows threat hunters in looking for common artifacts.
Daily feed of bad IPs with blacklist hit scores for cybersecurity professionals to stay informed about malicious IP addresses.