Andrea Palmieri🤌

67 Followers
97 Following
37 Posts

🎉 I'm releasing 4 new CLI tools for #threatintelligence !

They can help you interact with the @abuse_ch platforms: MalwareBazaar, ThreatFox, YARAify and URLhaus.

You can find more details in my latest blog post here:
https://andpalmier.com/posts/abuse-ch-toolkit

And below ⬇️

Releasing an Abuse.ch toolkit for threat intelligence

Introducing 4 new CLI tools in Go for interacting with Abuse.ch services

andpalmier's blog

They are all:
🐳 container ready
⚙️ fully scriptable
🧹 using only Go standard libraries
🍺 available on brew

Check out the full blog post https://andpalmier.com/posts/abuse-ch-toolkit/

Releasing an Abuse.ch toolkit for threat intelligence

Introducing 4 new CLI tools in Go for interacting with Abuse.ch services

andpalmier's blog

yrfy leverages YARAify, use it when you need to analyze a suspicious binary without uploading it to VirusTotal, or check for matches against community rules.

https://github.com/andpalmier/yrfy

GitHub - andpalmier/yrfy: CLI tool to interact with YARAify API

CLI tool to interact with YARAify API. Contribute to andpalmier/yrfy development by creating an account on GitHub.

GitHub

urlhs connects to URLhaus, use it if you need to block malware-serving URLs or track current malware distribution trends.

https://github.com/andpalmier/urlhs

GitHub - andpalmier/urlhs: CLI tool to search in URLhaus database and submit URLs

CLI tool to search in URLhaus database and submit URLs - andpalmier/urlhs

GitHub

tfox works with ThreatFox, use it to verify if a suspicious domain is in a known database of IOC.

https://github.com/andpalmier/tfoxt

mbzr is an interface to MalwareBazaar, use it to get fresh samples of a specific malware family (e.g., Emotet), or a retrieve a specific binary from its hash.

https://github.com/andpalmier/mbzr

🎉 I'm releasing 4 new CLI tools for #threatintelligence !

They can help you interact with the @abuse_ch platforms: MalwareBazaar, ThreatFox, YARAify and URLhaus.

You can find more details in my latest blog post here:
https://andpalmier.com/posts/abuse-ch-toolkit

And below ⬇️

Releasing an Abuse.ch toolkit for threat intelligence

Introducing 4 new CLI tools in Go for interacting with Abuse.ch services

andpalmier's blog

The blog also contains a shameless plug for a small project I've been working on in the last few days 👀

https://github.com/andpalmier/repopsy

GitHub - andpalmier/repopsy: OSINT tool to gather information on a git repo

OSINT tool to gather information on a git repo. Contribute to andpalmier/repopsy development by creating an account on GitHub.

GitHub

🆕 I've released a new blog post about #KawaiiGPT, a "malicious #LLM" that popped up recently. I discuss its #jailbreak engine, how it accesses expensive LLMs for free, and some risks it exposes its users to.

https://andpalmier.com/posts/kawaiigpt-analysis/

KawaiiGPT - Deep dive into the "malicious LLM"

A cool analysis and a shameless plug of repopsy

andpalmier's blog

🍺 apkingo is available on Homebrew!
You can now install it with:

```
brew tap andpalmier/tap
brew install apkingo
```

Check out the repo, release notes, and docs: https://github.com/andpalmier/apkingo

#Go #Homebrew #APK #APKAnalysis