Description: This project aims to enhance intelligence gathering by integrating it with well-known third-party sources. This includes an integration of ScarletShark and Shodan and retrieving intelligence data from them. During the analysis of forensic dumps and extracted files from a potentially compromised device, analysts collect IOCs (Indicator Of Compromise). It is crucial for analysts to easily gather threat intelligence from 3rd-parties. As an example, one identifies a potential malicious network communication with a specific domain name, the next logical step is to know what has already been documented about it.
Description: This project aims to enhance intelligence gathering by integrating it with well-known third-party sources. This includes an integration of ScarletShark and Shodan and retrieving intelligence data from them. During the analysis of forensic dumps and extracted files from a potentially compromised device, analysts collect IOCs (Indicator Of Compromise). It is crucial for analysts to easily gather threat intelligence from 3rd-parties. As an example, one identifies a potential malicious network communication with a specific domain name, the next logical step is to know what has already been documented about it.
Tasks: