项目作者: jedimasterbot

项目描述 :
Flask app for File, PCAP, IOC analysis
高级语言: Python
项目地址: git://github.com/jedimasterbot/ipf-analyzer.git
创建时间: 2021-03-15T19:50:25Z
项目社区:https://github.com/jedimasterbot/ipf-analyzer

开源协议:Apache License 2.0

下载


ipf-analyzer

forthebadge
forthebadge
forthebadge
forthebadge

The flask app accepts IOC (Indicator of Compromise), PCAP (Network Traffic), File in the respective tab
and can process the input.

Tabs Information

IOC Tab

The tab accepts any type of IOC and then submits the IOC on the bases of type
to the desired engines which include VirusTotal, Hybrid Analysis, Abuse IP,
MalShare, URLScan, Valhalla

Image of IOC

PCAP Tab

The tab accepts a network traffic capture file with the extension of .pcap,

  1. Extract IPs from PCAP
  2. Extract Public IPs from PCAP
  3. Extract URLs from PCAP
  4. Get the network traffic graph between data (bytes) and time
  5. Submit the IPs to the desired engines which include VirusTotal, Abuse IP, URLScan

Image of IOC

File Tab

The tab accepts any type of file,

  1. Extract file strings
  2. Extract PE information, if file is a valid PE
  3. Submit the sha256 of file to the desired engines which include VirusTotal, Hybrid Analysis, Abuse IP,
    MalShare, URLScan, Valhalla

Image of IOC

Requirements

Python3.6+

pip install -r requirements.txt

Usage

  1. You can get the API keys from the sites and then add the api keys in:

    /common/apiKeys.py

    If no keys are present then the submission into the engines will not take place.

  1. After this you can modify the config.ini, if you want to
    change the sever host and port. Default is set to localhost:5002
  1. Now run the invoker script to start the flask app,

    python invoker.py

Contribution

Any kind of contributions are welcome

  1. Fork the project
  2. Commit your changes
  3. Open a pull request