InQuest / ThreatIngestor

Extract and aggregate threat intelligence.
https://inquest.readthedocs.io/projects/threatingestor/
GNU General Public License v2.0
832 stars 135 forks source link

module 'iocextract' has no attribute 'refang_url' #143

Closed Bronya-Rayi closed 1 year ago

Bronya-Rayi commented 1 year ago

config.yml

general:
    daemon: false
    sleep: 900
    state_path: state.db

sources:
  - name: rsshub-blog
    # Read from the InQuest blog.
    module: rss
    url: https://rsshub.app/twitter/keyword/Gamaredon
    feed_type: messy

operators:
  - name: sqlite-artifacts
    # Write artifacts to a SQLite database.
    module: sqlite
    filename: artifacts.db

image

image

Bronya-Rayi commented 1 year ago

There is a problem with the latest version of the source code on pypi

image

battleoverflow commented 1 year ago

Hi, @Bronya-Rayi!

In the most recent release of iocextract, there was a renamed method, which isn't available in ThreatIngestor on PyPI yet. The new release will be out soon with improvements, including a fix for this issue. ThreatIngestor should still work with the previous version of iocextract (1.14.x >=). I'll ping this issue and close it once that new release is out.

battleoverflow commented 1 year ago

Hi, @Bronya-Rayi!

A new version of ThreatIngestor is now available on PyPI. All of the associated issues will be closed for this release, but if you do run into any other bugs, feel free to open another issue and I'll get a fix in as soon as possible.

The following issues should now be resolved:

Changelog: https://github.com/InQuest/ThreatIngestor/releases/tag/v1.1.0 Update your version locally: pip3 install threatingestor -U