ioc_parser
Malware reporter
Extracts indicators of compromise from PDF security reports
Tool to extract indicators of compromise from security reports in PDF format
430 stars
53 watching
171 forks
Language: Python
last commit: almost 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Extracts and organizes Indicators of Compromise from unstructured text files into structured formats. | 135 |
| A tool to extract and deobfuscate IOCs from text corpora, allowing analysts to work with previously inaccessible data | 513 |
| A repository of malware indicators and rules for threat hunting and analysis. | 1,698 |
| A collection of threat intelligence data, specifically malware indicators related to compromise events. | 221 |
| Provides a set of standardized indicators to help detect and assess malware presence | 10 |
| A Python package to generate fang and defang indicators of compromise in text. | 57 |
| Automates malware analysis workflow by extracting features and indicators of compromise from malicious files using various tools and libraries. | 16 |
| Tools for extracting and analyzing threat indicators from various data sources | 84 |
| A collection of indicators of compromise categorized by group, providing information on malware families and their characteristics. | 903 |
| Generates a JSON object representing the structure of a malicious PDF file. | 53 |
| Analyzes emails to extract security-relevant information | 76 |
| An interactive tool for extracting and parsing threat intelligence data from text | 159 |
| A simple Bash script to scan Linux/Unix systems for Indicators of Compromise (IOCs) without installing additional software or agents. | 702 |
| A collection of indicators of compromise from various investigations and blogs. | 79 |
| A repository providing PCAP IOC data related to known malware samples | 98 |