If you require threat intelligence research with hassle-free on data collection, you may try Threat Miner.
Threat Miner is an open source search engine for fast threat intelligence research and pivoting with context. It frees the analysts from data collection and provide analysts with a portal for performing their duties, including perusing reports, pivoting, and data enrichment.
It also offers third party integration with SOAR and SIEM via Threat Miner API to provide investigation activities such as:
1. Test connectivity: Validate the asset configuration for connectivity using supplied configuration
2. Lookup domain: Check for the presence of a domain in a threat intelligence feed
3. Lookup hash: Check for the presence of a hash in a threat intelligence feed
4. Lookup ip: Check for the presence of an IP in a threat intelligence feed
5. whois domain: Execute whois lookup on the given domain
6. Reverse ip: Find domain names that share an IP
7. whois ip: Execute whois lookup on the given IP address
8. Lookup av: Lookup AV String
9. Lookup ssl: Search SSL thumbprint
Post a Comment
0Comments