pun1sh3r / iocminion

Just another tool to extract Indicator of compromise (ioc) from files
28 stars 5 forks source link

iocminion

======= Just another tool to extract IOC's from files. this tool has the capability to extract IOC's from the following sources: pdf documents, urls that contain pdf's, a text file that contains urls, ioc's from emails and rss feeds. it also perform whitelisting in order to prevent false positives. it uses the files whitelist.dat and the alexa top 1m files.

Requirements

Usage

======

usage: iocminion.py [-h] [--rss RSS] [--url_file URL_FILE] [--url URL]
                    [--pdf PDF] [--email EMAIL EMAIL] [--format {csv,json}]

welcome to iocMinion

optional arguments:
  -h, --help           show this help message and exit

Formats supported:
  --rss RSS            process rss url
  --url_file URL_FILE  process text file with urls
  --url URL            process url
  --pdf PDF            process pdf on an url or a pdf on the filesystem. make sure filename doesnt contain spaces
  --email EMAIL EMAIL  looks for iocs on gmail inbox. username and password are required (username pass)
  --format {csv,json}  output format

Usecases: