Skip to main content

Extract IOCs from text.

Project description

ioc-hunter

IOC Hunter finds indicators of compromise (IOC). The IOCHunter class can extract IOCs from text. The IOCTyper class can determine the IOC type of a string that you pass in.

The IOCs that are recognized by both of these classes are:

  • ssdeep
  • sha256
  • sha1
  • md5
  • email
  • ipv4_public
  • ipv4_private
  • ipv6_public
  • ipv6_private
  • filename
  • domain
  • url

IOC Parser

The IOCParse class uses one method to parse all IOCs in the list above from text. There is an option to defang the IOCs that are passed back as well as an option to provide a whitelist regex. This will also return IOCs labeled as unknown when text is found to be suspicious, but doesn't quite match any of the IOC types.

from ioc_hunter import IOCHunter

text = "Your text goes here"
whitelist = r".*internaldomain\.com.*"
hunter = IOCHunter()
iocs = hunter.parse_iocs(text, defang=False, whitelist_regex=whitlist)

IOC Typer

The IOCTyper class takes in text and determines if that text matches any of the IOC types. If it does not match any, it will return unkown.

from ioc_hunter import IOCTyper

suspected_ioc = "mydomain.com"
typer = IOCTyper()
ioc_type = typer.type_ioc(suspected_ioc)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

IOC Hunter-1.0.0.tar.gz (13.6 kB view hashes)

Uploaded Source

Built Distribution

IOC_Hunter-1.0.0-py3-none-any.whl (13.7 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page