Skip to content

Latest commit

 

History

History
25 lines (15 loc) · 1.11 KB

README.md

File metadata and controls

25 lines (15 loc) · 1.11 KB

falcon-prime-bulk-ip search function

This is repurposed code from a crowdstrike engineer to do what I needed. I re-wrote 5-10% how I would want to use it with one function and append to a data frame.

Need: If you have crowstrike falcon prime and need to search for a csv of malicious ip's, and want to append the intel to your csv of ip's.

You need to get your base url, client secret and client id (remember not to hard code why I use getpass).

image

Operational overview

    1. Change the csv paths
    1. Install falconpy and other dependencies
    1. Run
    1. It will prompt you for the three things mentioned above

Notes

  • I was threat hunting over a huge area with little integration to crowd strikes tools. So, this saved me a ton of time gathering intel on malicous IP's that were fuzzing or attempting to exploit.

Contact

***If you have issues and need help reach out to [email protected]

MIT License