mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2024-12-25 05:35:26 +00:00
Add Automater from TekDefense to OSINT Tools
Added Automater from TekDefense to OSINT Tools. The tool is Open Source https://github.com/1aN0rmus/TekDefense-Automater
This commit is contained in:
parent
5069cee252
commit
e2d8022454
@ -106,6 +106,7 @@ A curated list of awesome malware analysis tools and resources. Inspired by
|
|||||||
framework for receiving and redistributing abuse feeds and threat intel.
|
framework for receiving and redistributing abuse feeds and threat intel.
|
||||||
* [AlienVault Open Threat Exchange](https://otx.alienvault.com/) - Share and
|
* [AlienVault Open Threat Exchange](https://otx.alienvault.com/) - Share and
|
||||||
collaborate in developing Threat Intelligence.
|
collaborate in developing Threat Intelligence.
|
||||||
|
* [Automater](http://www.tekdefense.com/automater/) - Automater from TekDefense is a URL/Domain, IP Address, and Md5 Hash OSINT tool aimed at making the analysis process easier for intrusion Analysts. Given a target (URL, IP, or HASH) or a file full of targets Automater will return relevant results from sources like the following: IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me, Urlvoid.com, Labs.alienvault.com, ThreatExpert, VxVault, and VirusTotal.
|
||||||
* [Combine](https://github.com/mlsecproject/combine) - Tool to gather Threat
|
* [Combine](https://github.com/mlsecproject/combine) - Tool to gather Threat
|
||||||
Intelligence indicators from publicly available sources.
|
Intelligence indicators from publicly available sources.
|
||||||
* [IntelMQ](https://www.enisa.europa.eu/topics/csirt-cert-services/community-projects/incident-handling-automation) -
|
* [IntelMQ](https://www.enisa.europa.eu/topics/csirt-cert-services/community-projects/incident-handling-automation) -
|
||||||
|
Loading…
Reference in New Issue
Block a user