TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs. The idea behind the tool is to facilitate searching and storing of frequently added IOCs for creating your own set of indicators. Requirements: Python 2.7, Argparse, Requests, API keys from Virustotal and URLVoid. Features: Local storage of threat feeds, check an IP against existing threat feeds and your local database, check for Bulk IP address list, check for MD5 Hash.
Common questions about Threat Intelligence Hunter (TIH) including features, pricing, alternatives, and user reviews.
Threat Intelligence Hunter (TIH) is TIH is an intelligence tool that helps you search for IOCs across multiple security feeds and APIs. It is a Threat Management solution designed to help security teams with IOC, Cyber Threat Intelligence.
Threat Intelligence Hunter (TIH) is a free Threat Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/abhinavbom/Threat-Intelligence-Hunter/ for download and installation instructions.
Popular alternatives to Threat Intelligence Hunter (TIH) include:
Compare these tools and more at https://cybersectools.com/categories/threat-management
Threat Intelligence Hunter (TIH) is for security teams and organizations that need IOC, Cyber Threat Intelligence. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Threat Management tools can be found at https://cybersectools.com/categories/threat-management
Cybercrime intelligence tools for searching compromised credentials from infostealers
Threat intelligence platform combining Google, Mandiant, and VirusTotal data