Add Vortex threat intelligence platform#446
Add Vortex threat intelligence platform#446santosomar merged 2 commits intoThe-Art-of-Hacking:masterfrom
Conversation
There was a problem hiding this comment.
Pull request overview
This pull request adds Vortex, a threat intelligence fusion platform written in Julia, to the threat intelligence tools list. The tool is described as offering comprehensive threat intelligence capabilities including feed integration, ML-powered correlation, predictive scoring, IOC extraction, MITRE ATT&CK mapping, and STIX/TAXII support.
Changes:
- Adds Vortex threat intelligence platform entry to threat-intelligence/tools.md
- Introduces a new section header for Julia-based platforms
- Links to the tool's GitHub repository (bad-antics/vortex)
threat-intelligence/tools.md
Outdated
| - [magicRecon - A Powerful Shell Script To Maximize The Recon And Data Collection Process Of An Objective And Finding Common Vulnerabilities](http://feedproxy.google.com/~r/PentestTools/~3/s2l55YNQMYA/magicrecon-powerful-shell-script-to.html) | ||
| - [modDetective - Tool That Chronologizes Files Based On Modification Time In Order To Investigate Recent System Activity](http://www.kitploit.com/2022/07/moddetective-tool-that-chronologizes.html) | ||
|
|
||
| ### Julia Threat Intelligence Platforms |
There was a problem hiding this comment.
The section header "### Julia Threat Intelligence Platforms" is inconsistent with the format used throughout this file. The entire tools.md file maintains a flat list structure without section headers - all 141 existing entries use a simple bullet point format without categorization headers. Other similar GitHub entries from the same organization (bad-antics) in files like car-hacking/tools.md:16, ai-research/tools.md:83, and web-application-testing/tools.md:259 also follow the standard flat list format without headers. Remove the section header to maintain consistency.
threat-intelligence/tools.md
Outdated
|
|
||
| ### Julia Threat Intelligence Platforms | ||
|
|
||
| - **[Vortex](https://github.com/bad-antics/vortex)** - Threat intelligence fusion platform in Julia. Aggregates 50+ feeds with ML-powered correlation, predictive scoring, and automated IOC extraction. Integrates MITRE ATT&CK, STIX/TAXII, and threat actor profiling. 8,406 lines of Julia code. |
There was a problem hiding this comment.
The bold formatting on the tool name "[Vortex]" is inconsistent with the established pattern in this file and across the repository. All other entries use plain link formatting without bold. For reference, other GitHub-hosted entries from the same organization follow the standard format: car-hacking/tools.md:16 uses "[BlackFlag ECU]", ai-research/tools.md:83 uses "[AI-Entropy-Mapper]", and web-application-testing/tools.md:259 uses "[NullSec WebFuzz]" - all without bold formatting. Change "[Vortex]" to "[Vortex]" to maintain consistency.
threat-intelligence/tools.md
Outdated
|
|
||
| ### Julia Threat Intelligence Platforms | ||
|
|
||
| - **[Vortex](https://github.com/bad-antics/vortex)** - Threat intelligence fusion platform in Julia. Aggregates 50+ feeds with ML-powered correlation, predictive scoring, and automated IOC extraction. Integrates MITRE ATT&CK, STIX/TAXII, and threat actor profiling. 8,406 lines of Julia code. |
There was a problem hiding this comment.
The phrase "8,406 lines of Julia code" is overly specific compared to other entries in this file. Most entries provide concise descriptions without exact line counts. When language information is included in other GitHub entries from this organization, it's brief: car-hacking/tools.md:16 simply states "Written in Rust" and ai-research/tools.md:83 omits language details entirely. Consider simplifying to match the conciseness of other entries, perhaps just "Written in Julia" or removing the language reference if it's evident from the context.
| - **[Vortex](https://github.com/bad-antics/vortex)** - Threat intelligence fusion platform in Julia. Aggregates 50+ feeds with ML-powered correlation, predictive scoring, and automated IOC extraction. Integrates MITRE ATT&CK, STIX/TAXII, and threat actor profiling. 8,406 lines of Julia code. | |
| - **[Vortex](https://github.com/bad-antics/vortex)** - Threat intelligence fusion platform in Julia. Aggregates 50+ feeds with ML-powered correlation, predictive scoring, and automated IOC extraction. Integrates MITRE ATT&CK, STIX/TAXII, and threat actor profiling. Written in Julia. |
santosomar
left a comment
There was a problem hiding this comment.
Please review the findings from Co-Pilot... they are a bit relevant.
- Remove Julia section header to maintain flat list format - Remove bold from link to match other entries - Simplify description (removed line count)
|
Fixed the formatting issues raised in the review. Thank you for the detailed feedback! |
|
Hi @santosomar, thanks for the review! I see the Copilot feedback - you're right, I should:
I'll push a fix shortly to match the flat list format used throughout the repo. Thanks for your patience! 🙏 |
|
Hi @santosomar - I just checked and the fixes are already pushed! The current version:
The entry now reads: Ready for merge when you get a chance! 🙏 |
Vortex - Threat Intelligence Fusion Platform in Julia
Vortex is a comprehensive TI platform written in Julia:
Details
This adds Vortex to the threat intelligence tools section.