Lucene search

K
kitploitKitPloitKITPLOIT:5516914113893599681
HistoryMar 05, 2022 - 11:30 a.m.

IOC Scraper - A Fast And Reliable Service That Enables You To Extract IOCs And Intelligence From Different Data Sources

2022-03-0511:30:00
www.kitploit.com
25

IOC Scraper utilises IOCPARSER service to fetch IOCs from different vendor Blogs, PDFs, and CSV files. Parsing IOCs is time-consuming process, using current script one can automatically extract and aggregate IOCs easily.

Features

  • Defanged IOCs : Supports extracting and defanging IOCs.
  • Whitelist IOCs : Supports custom whitlisting of IOCs.
  • Source Types : Supports variety of sources such as Blogs, PDFs, CSV, and much more.

Supported IOC Types

IOC Scraper supports a variety of IOC types.

IOC TYPE STATUS
ASN Supported
IPv4, IPv6 Supported
URL, Domain Supported
Email Supported
MD5, SHA1, SHA256, File Name Supported
MAC Address Supported
MITRE ATT&CK IDs Supported
YARA Rules Supported

Installation

git clone https://www.github.com/chaitanyakrishna/iocscraper.git  
pip3 install -f requirements.txt

Usage

python IOC_Scraper.py -h  
 ___ ___   ____   ____  
|_ _/ _ \ / ___| / ___|  ___ _ __ __ _ _ __   ___ _ __  
 | | | | | |     \___ \ / __| '__/ _` | '_ \ / _ \ '__|  
 | | |_| | |___   ___) | (__| | | (_| | |_) |  __/ |  
|___\___/ \____| |____/ \___|_|  \__,_| .__/ \___|_|  
                                      |_|  
  
  
usage: IOC_Scraper.py [-h] [-u URL] [-uL FILE_CONTAINING_URLS] [-t TIMEOUT]  [-th THREADNUMBER] -o OUTPUT  
  
IOC_Scraper v1.0  
  
Optional Arguments:  
  -h, --help            show this help message and exit  
  -u URL, --url         Single URL for Fetching IOCs  
  -uL FILE_CONTAINING_URLS, --url-list FILE_CONTAINING_URLS File Containing URL, One URL in One Line.  
  -t TIMEOUT, --timeout TIMEOUT HTTP Request Timeout. default=60  
  -th THREADNUMBER, --thread THREADNUMBER Parallel HTTP Request Number. default=100  
  
Required Arguments:  
  -o OUTPUT, --output OUTPUT Output file name.  

Sample command line arguments

python iocscraper.py -u "http://targeturl.com" -o report  
  
python iocscraper.py -uL urls.txt -o report  

Output

Duplicates … ==================================================================================================== [Date: 20-01-2022] [Time: 23:03:13] [INFO] Fetched IOCs from the following domains ==================================================================================================== 1. blog.aquasec.com 2. nationalcybersecurity.com 3. cofense.com 4. thehackernews.com 5. blog.sucuri.net 6. threats.amnpardaz.com 7. www.crowdstrike.com 8. www.bleepingcomputer.com 9. forensicitguy.github.io 10. marcusedmondson.com 11. rajhackingarticles.blogspot.com 12. research.checkpoint.com 13. www.reddit.com 14. www.zerofox.com ==================================================================================================== [Date: 20-01-2022] [Time: 23:03:13] [INFO] Indicator of Compromise Stats ==================================================================================================== Domain : 52 URL : 26 IPv4 : 15 IPv6 : 0 ASN : 0 FILE_HASH_MD5 : 24 FILE_HASH_SHA1 : 16 FILE_HASH_SHA256 : 3 MITRE_ATTACK : 4 EMAIL : 3 CVE : 7 FILE_NAME : 59 YARA_RULE : 0 MAC_ADDRESS : 0 ==================================================================================================== [Date: 20-01-2022] [Time: 23:03:13] [INFO] Total IOCs: 209 ==================================================================================================== ">

python IOC_Scraper.py -uL url_list.txt -o report  
 ___ ___   ____   ____  
|_ _/ _ \ / ___| / ___|  ___ _ __ __ _ _ __   ___ _ __  
 | | | | | |     \___ \ / __| '__/ _` | '_ \ / _ \ '__|  
 | | |_| | |___   ___) | (__| | | (_| | |_) |  __/ |  
|___\___/ \____| |____/ \___|_|  \__,_| .__/ \___|_|  
                                      |_|  
  
  
====================================================================================================  
[Date: 20-01-2022] [Time: 23:03:09] [INFO] Initiating IOC Scraper ...  
====================================================================================================  
[*] ProgressBar: 14/14 [Fethcing IOC from: thehackernews.com] [Errors: 0] ...  0] ...  ...  
[Date: 20-01-2022] [Time: 23:03:13] [INFO] Removing Duplicates ...  
  
  
  
====================================================================================================  
[Date: 20-01-2022] [Time: 23:03:13] [I   NFO] Fetched IOCs from the following domains  
====================================================================================================  
  
  
1.  blog.aquasec.com  
2.  nationalcybersecurity.com  
3.  cofense.com  
4.  thehackernews.com  
5.  blog.sucuri.net  
6.  threats.amnpardaz.com  
7.  www.crowdstrike.com  
8.  www.bleepingcomputer.com  
9.  forensicitguy.github.io  
10.  marcusedmondson.com  
11.  rajhackingarticles.blogspot.com  
12.  research.checkpoint.com  
13.  www.reddit.com  
14.  www.zerofox.com  
  
  
====================================================================================================  
[Date: 20-01-2022] [Time: 23:03:13] [INFO] Indicator of Compromise Stats  
====================================================================================================  
  
  
Domain           : 52  
URL              : 26  
IPv4             : 15  
IPv6             : 0  
ASN              :    0  
FILE_HASH_MD5    : 24  
FILE_HASH_SHA1   : 16  
FILE_HASH_SHA256 : 3  
MITRE_ATTACK     : 4  
EMAIL            : 3  
CVE              : 7  
FILE_NAME        : 59  
YARA_RULE        : 0  
MAC_ADDRESS      : 0  
  
  
====================================================================================================  
[Date: 20-01-2022] [Time: 23:03:13] [INFO] Total IOCs: 209  
====================================================================================================  

API Reference

Authors

Acknowledgements

Download Iocscraper