Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt
ThreatIngestor Logo

ThreatIngestor

An extendable tool to extract and aggregate IOCs from threat feeds, integrates with ThreatKB and MISP.

882
Threat Management
Free
Visit website
Claim and verify your listing
Claim and verify your listing
0

ThreatIngestor Description

An extendable tool to extract and aggregate IOCs from threat feeds. Integrates out-of-the-box with ThreatKB and MISP, and can fit seamlessly into any existing workflow with SQS, Beanstalk, and custom plugins. Currently used by InQuest Labs IOC-DB: https://labs.inquest.net/iocdb Overview: ThreatIngestor can be configured to watch Twitter, RSS feeds, sitemap (XML) feeds, or other sources, and extract meaningful information such as malicious IPs/domains and YARA signatures, and send that information to another system for analysis. Try it out now with this quick walkthrough, read more ThreatIngestor walkthroughs on the InQuest blog, and check out labs.inquest.net/iocdb, an IOC aggregation and querying tool powered by ThreatIngestor. Installation: ThreatIngestor requires Python 3.6+, with development headers. Install ThreatIngestor from PyPI: pip install threatingestor. Install optional dependencies for using some plugins, as needed: pip install threatingestor[all]. View the full installation instructions for more information. Usage: Create a new config.yml file, and configure each source and operator module you want to use. (See config.example.yml for layout.) Then run the sc

ThreatIngestor FAQ

Common questions about ThreatIngestor including features, pricing, alternatives, and user reviews.

ThreatIngestor is An extendable tool to extract and aggregate IOCs from threat feeds, integrates with ThreatKB and MISP.. It is a Threat Management solution designed to help security teams with Threat Intelligence, IOC, Threat Feed.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavantAI Logo

Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.

5
OSINTLeak Logo

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

5
Mandos Brief Cybersecurity Newsletter Logo

Weekly cybersecurity newsletter for security leaders and professionals

5
View Popular Tools →