Harbinger
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
QRadio is a tool/framework designed to consolidate cyber threats intelligence sources. The goal of the project is to establish a robust modular framework for extraction of intelligence data from vetted sources. It uses multiple threat intelligence sources for searching supplied data. Currently we crawl the following: You can search by the following data types: Domain IPv4 Hash Imphash Mutex Threat Info databases: ThreatCrowd Virustotal Cymon IBM X-Force Exchange Metadefender #totalhash Sandboxes: Malwr Threatexpert Blacklists: ASPROX Tracker Feodot Tacker Zeus Tracker malc0de McAfee Other: FortiGuard hpHosts Credentials for sources /lib/config.py Usage python cli_qradio.py Options Output verbosity: Return CSV if not specified -v, --verbose - Show verbose output From Domain -100, --sonar_domain - SONAR <domain> to IPv4, Hash, Score, URL, Blacklist -102, --domain_to_ipv4 - Re
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
A collection of YARA rules for Windows, Linux, and Other threats.
A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.
A daily collection of IOCs from various sources, including articles and tweets.
CLI tool for ThreatCrowd.org with multiple query functions.
Platform for the latest threat intelligence information