Umbrella Investigate API Logo

Umbrella Investigate API

0
Free
Visit Website

Umbrella Investigate provides an API that allows querying for: Domain categorization, Security information about a domain, Co-occurrences for a domain, Related domains for a domain, Domains related to an IP, Domain tagging dates for a domain, DNS RR history for a domain, WHOIS information, WHOIS information for an email, WHOIS information for a nameserver, Historical WHOIS information for a domain, Latest malicious domains for an IP. To use the Investigate API wrapper import InvestigateApi class from threat_intel.opendns module: from threat_intel.opendns import InvestigateApi. To initialize the API wrapper you need the API key: investigate = InvestigateApi("<INVESTIGATE-API-KEY-HERE>"). You can also specify a file name where the API responses will be cached in a JSON file, to save you the bandwidth for the multiple calls about the same domains or IPs: investigate = InvestigateApi("<INVESTIGATE-API-KEY-HERE>", cache_file_name="/tmp/cache.opendns.json"). Domain categorization Calls domains/categorizat

FEATURES

ALTERNATIVES

CAPEC™ is a comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in cyber-enabled capabilities.

Platform for the latest threat intelligence information

A tool to extract indicators of compromise from security reports in PDF format.

A tool for extracting IOCs from various input sources and converting them into JSON format.

A platform providing an activity feed on exploited vulnerabilities.

Converts OpenIOC v1.0 XML files into STIX Indicators, generating STIX v1.2 and CybOX v2.1 content.

A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.

NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.

PINNED