IOC Parser

IOC Parser

#Threat Defense#Threat Management

A python3 application for querying sites hosting publicly pasted data and scanning for sensitive information.

Visit Website

IOC Parser: A Tool for Extracting Indicators of Compromise

The IOC Parser is a tool designed to extract indicators of compromise (IOCs) from security reports that are in PDF format. You can find a comprehensive collection of APT-related reports containing numerous IOCs at APTNotes. Usage: iocp [-h] [-p INI] [-i FORMAT] [-o FORMAT] [-d] [-l LIB] FILE - FILE: Specify the file or directory path to the report(s). - -p INI: Define the pattern file to use. - -i FORMAT: Indicate the input format (options include pdf, txt, or html). - -o FORMAT: Specify the output format (choices are csv, json, or yara). - -d: Enable deduplication of matches. - -l LIB: Select the parsing library to be utilized. Requirements: 1. Maintain all technical terms and concepts exactly as they are. 2. Ensure the language is clearer and more accessible. 3. Preserve the same content structure and format. 4. Do not add or remove any information. 5. Keep a similar length; if the content is very brief, add a little more detail.

Installation Instructions

To install the ioc_parser, use the following command: pip install ioc_parser

Required PDF Parsing Libraries

To proceed, you need to install one of the following PDF parsing libraries: - PyPDF2: Use the command `pip install pypdf2` - pdfminer: Use the command `pip install pdfminer`

HTML Parsing Support

- To install BeautifulSoup, use the following command: pip install beautifulsoup4

HTTP(S) Support Requirements

- To enable HTTP(S) support, run the following command: pip install requests