Skip to content

Analyze IoCs with various threat intelligence services. IoC type will be detected automatically.

License

Notifications You must be signed in to change notification settings

dev-lu/ioc_analyzer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

60 Commits
 
 
 
 
 
 
 
 

Repository files navigation

IoC analyzer

Tool to analyze IoCs with various OSINT APIs. Prints a detailed report and a summary table on the cli. IoC type is detected automatically.

Supported IoC types and implemented services:

IP addresses

  • AbuseIPDB
  • IPQualityScore
  • Virustotal
  • Alienvault
  • Blocklist.de
  • THREATfox (abuse.ch)
  • Maltiverse
  • Shodan
  • BGPView
  • Pulsedive
  • Twitter
  • Reddit

Domains

  • Virustotal
  • Alienvault
  • Google Safe Browsing
  • Shodan
  • Pulsedive
  • Twitter
  • Reddit

URLs

  • Virustotal
  • Google Safe Browsing
  • URLhaus (abuse.ch)
  • Pulsedive
  • Twitter
  • Reddit

MD5 hashes

  • Virustotal
  • Alienvault
  • THREATfox (abuse.ch)
  • MALWAREbazaar (abuse.ch)
  • Pulsedive
  • Twitter
  • Reddit

SHA1 hashes

  • Virustotal
  • Alienvault
  • THREATfox (abuse.ch)
  • MALWAREbazaar (abuse.ch)
  • Pulsedive
  • Twitter
  • Reddit

SHA256 hashes

  • Virustotal
  • Alienvault
  • THREATfox (abuse.ch)
  • MALWAREbazaar (abuse.ch)
  • Pulsedive
  • Twitter
  • Reddit

Example output for an ip address:

ioca_ip

Example output for hashes:

ioca_sha1 ioca_twitter

For this tool to work properly, you need to register on the following services and generate API keys:

About

Analyze IoCs with various threat intelligence services. IoC type will be detected automatically.

Resources

License

Stars

Watchers

Forks