A tool to gather and enrich threat intelligence indicators from publicly available sources into a structured CSV format.
Combine is a Python-based tool that aggregates threat intelligence indicators from publicly available sources into a structured CSV format. It automates the collection, processing, and enrichment of data like IP addresses and domains, helping security teams integrate external threat feeds into their analysis workflows.
Security analysts, threat intelligence teams, and cybersecurity professionals who need to automate the gathering and standardization of external threat data for monitoring and investigation.
Combine simplifies threat intelligence aggregation by providing a unified, automated pipeline that outputs consistent, enriched data, reducing manual effort and improving integration with tools like CRITs.
Tool to gather Threat Intelligence indicators from publicly available sources
Pulls threat data from numerous publicly available intelligence feeds like OpenBL and AlienVault, automating collection from diverse sources into one pipeline.
Exports data in a consistent schema with fields for entity, type, direction, source, notes, and date, ensuring standardized and analyzable threat intelligence.
Augments indicators with ASN, country, and DNS information using MaxMind GeoIP and Farsight DNSDB, adding valuable context to raw threat data.
Can be run as a single command or step-by-step via separate scripts (reaper, thresher, winnower, baler), offering flexibility in execution and debugging.
Supports direct export to the CRITs threat intelligence platform via API, with specific configuration for URL, username, and API key, facilitating seamless workflow integration.
Enrichment requires API keys from Farsight DNSDB and reliance on MaxMind databases, adding setup complexity, potential costs, and points of failure.
Primarily designed for predefined public feeds; adding custom or private sources likely requires code modifications, as the README doesn't mention extensibility options.
Outputs only in CSV format, lacking support for other common threat intelligence formats like STIX or JSON, which may hinder integration with modern security tools.
Main Sigma Rule Repository
The pattern matching swiss knife
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Binary analysis and management framework
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.