Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc. feeds.py contains a dictionary list of various feeds to use. config.py contains a small list of configuration settings for syslog purposes. Usage: Simply run threataggregator.py with no arguments. Application will grab HTTP-based feeds from feeds.py, and send syslog packets to the target specified in config.py. Standard JSON-formatted output will also be displayed stdout from threataggregator.py.
Common questions about ThreatAggregator including features, pricing, alternatives, and user reviews.
ThreatAggregator is Aggregates security threats from online sources and outputs to various formats. It is a Threat Management solution designed to help security teams with Snort, Linux, Cyber Threat Intelligence.
ThreatAggregator is a free Threat Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/jpsenior/threataggregator/ for download and installation instructions.
Popular alternatives to ThreatAggregator include:
Compare these tools and more at https://cybersectools.com/categories/threat-management
ThreatAggregator is for security teams and organizations that need Snort, Linux, Cyber Threat Intelligence. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Threat Management tools can be found at https://cybersectools.com/categories/threat-management
Cybercrime intelligence tools for searching compromised credentials from infostealers
Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.