ThreatTracker Logo

ThreatTracker

0
Free
Visit Website

ThreatTracker is an IOC tracker written in Python that periodically queries 4 Google Custom Search Engines to identify new AV definitions, malware sample submissions, malicious URLs and domains, and performs Reverse WHOIS lookup. It also monitors domain status using the Google Safe Browsing Lookup API and Google Safebrowsing Diagnosis Page. Requirements include Google APIs Client Library for Python, 1 Gmail account (to act as sender), and Google API key(s). To use the script, rules must be created in the /rules directory. Note: A sample rule (for tracking Dridex) is provided to highlight the required format. This project is still in beta, so bug reports are welcome. For questions, new data sources, or ideas, feel free to email the developer.

FEATURES

ALTERNATIVES

Yara rule generator using VirusTotal code similarity feature code-similar-to.

A robust Python implementation of TAXII Services with a friendly pythonic API.

A sophisticated npm attack attributed to North Korean threat actors, targeting technology firms and their employees.

A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.

Automatically create yara rules based on images embedded in office documents.

A cybersecurity tool for managing data points and cyber threat indicators with a focus on neo4j data traversal.

RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.

Get insights into the latest cybersecurity trends and expert advice on enhancing organizational security.

PINNED