
IOC Parser
#Threat Defense#Threat Management
A python3 application for querying sites hosting publicly pasted data and scanning for sensitive information.
IOC Parser: A Tool for Extracting Indicators of Compromise
The IOC Parser is a tool designed to extract indicators of compromise (IOCs) from security reports that are in PDF format. You can find a comprehensive collection of APT-related reports containing numerous IOCs at APTNotes.
Usage:
iocp [-h] [-p INI] [-i FORMAT] [-o FORMAT] [-d] [-l LIB] FILE
- FILE: Specify the file or directory path to the report(s).
- -p INI: Define the pattern file to use.
- -i FORMAT: Indicate the input format (options include pdf, txt, or html).
- -o FORMAT: Specify the output format (choices are csv, json, or yara).
- -d: Enable deduplication of matches.
- -l LIB: Select the parsing library to be utilized.
Requirements:
1. Maintain all technical terms and concepts exactly as they are.
2. Ensure the language is clearer and more accessible.
3. Preserve the same content structure and format.
4. Do not add or remove any information.
5. Keep a similar length; if the content is very brief, add a little more detail.
Installation Instructions
To install the ioc_parser, use the following command: pip install ioc_parser
Required PDF Parsing Libraries
To proceed, you need to install one of the following PDF parsing libraries:
- PyPDF2: Use the command `pip install pypdf2`
- pdfminer: Use the command `pip install pdfminer`
HTML Parsing Support
- To install BeautifulSoup, use the following command: pip install beautifulsoup4
HTTP(S) Support Requirements
- To enable HTTP(S) support, run the following command: pip install requests