ThreatAggregator Logo

ThreatAggregator

0
Free
Visit Website

Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc. feeds.py contains a dictionary list of various feeds to use. config.py contains a small list of configuration settings for syslog purposes. Usage: Simply run threataggregator.py with no arguments. Application will grab HTTP-based feeds from feeds.py, and send syslog packets to the target specified in config.py. Standard JSON-formatted output will also be displayed stdout from threataggregator.py.

FEATURES

ALTERNATIVES

Automatically create yara rules based on images embedded in office documents.

CLI tool for ThreatCrowd.org with multiple query functions.

A database of Tor exit nodes with their corresponding IP addresses and timestamps.

Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.

A robust Python implementation of TAXII Services with a friendly pythonic API.

Converts OpenIOC v1.0 XML files into STIX Indicators, generating STIX v1.2 and CybOX v2.1 content.

A system for collecting, managing, and distributing security information on a large scale, developed by CERT Polska.

Generate Bro intel files from pdf or html reports.