You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Happy new year! :sparkler: And Happy Birthday IntelOwl! :tada:
7
+
8
+
We are celebrating the 6th IntelOwl Birthday! :sunglasses: WOW! Such a Milestone!
9
+
10
+
And we reached almost 4.5k stars! :star: Thank you for your support!
11
+
12
+
This release merges all the developments performed by our Google Summer of Code contributors for this year. You can read the related blogs for more info about:
13
+
-[Akshit Maheshwary](https://x.com/Akshit20437406): [IntelOwl Improvements: Analyzers and Integrations](https://intelowlproject.github.io/blogs/gsoc_25_new_analyzers_and_integrations)
As usual, we add new plugins. This release brings the following new ones:
24
+
*[Hunting Abuse.ch](https://hunting.abuse.ch/api/): new central API for Abuse.ch
25
+
*[YaraX](https://virustotal.github.io/yara-x/docs/intro/getting-started/) integration: you can now run your Yara rules with the new engine written in Rust
26
+
* Now [Floss](https://github.com/mandiant/flare-floss) and [Capa](https://github.com/mandiant/capa) are integrated directly in the main container so you don't need anymore to run the optional container `malware_tools_analyzers" for them.
27
+
*[Phunter](https://github.com/N0rz3/Phunter) which requires the execution of a new optional container with `--phunter`.
28
+
*[JoeSandbox](https://www.joesandbox.com/), a malware analysis tool.
29
+
* "ExpandURL" which takes a shortened URL and provides us the actual expanded URL, along with full redirection chain.
30
+
31
+
We don't mention here all the other adjustments, fixes and dependencies upgrades. Please check the full changelog for that.
Copy file name to clipboardExpand all lines: .github/pull_request_template.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,8 +26,8 @@ Please delete options that are not relevant.
26
26
-[ ] Check if it could make sense to add that analyzer/connector to other [freely available playbooks](https://intelowlproject.github.io/docs/IntelOwl/usage/#list-of-pre-built-playbooks).
27
27
-[ ] I have provided the resulting raw JSON of a finished analysis and a screenshot of the results.
28
28
-[ ] If the plugin interacts with an external service, I have created an attribute called precisely `url` that contains this information. This is required for Health Checks (HEAD HTTP requests).
29
-
-[ ] If the plugin requires mocked testing, `_monkeypatch()` was used in its class to apply the necessary decorators.
30
-
-[ ] I have added that raw JSON sample to the `MockUpResponse`of the `_monkeypatch()` method. This serves us to provide a valid sample for testing.
29
+
-[ ] If a new analyzer has beed added, I have created a unittest for it in the appropriate dir. I have also mocked all the external calls, so that no real calls are being made while testing.
30
+
-[ ] I have added that raw JSON sample to the `get_mocker_response()` method of the unittest class. This serves us to provide a valid sample for testing.
31
31
-[ ] I have created the corresponding `DataModel` for the new analyzer following the [documentation](https://intelowlproject.github.io/docs/IntelOwl/contribute/#how-to-create-a-datamodel)
32
32
-[ ] I have inserted the copyright banner at the start of the file: ```# This file is a part of IntelOwl https://github.com/intelowlproject/IntelOwl # See the file 'LICENSE' for copying permission.```
33
33
-[ ] Please avoid adding new libraries as requirements whenever it is possible. Use new libraries only if strictly needed to solve the issue you are working for. In case of doubt, ask a maintainer permission to use a specific library.
Copy file name to clipboardExpand all lines: README.md
+2-14Lines changed: 2 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,21 +64,19 @@ You can see the full list of all available analyzers in the [documentation](http
64
64
65
65
As open source project maintainers, we strongly rely on external support to get the resources and time to work on keeping the project alive, with a constant release of new features, bug fixes and general improvements.
66
66
67
-
Because of this, we joined [Open Collective](https://opencollective.com/intelowl-project) to obtain non-profit equal level status which allows the organization to receive and manage donations transparently. Please support IntelOwl and all the community by choosing a plan (BRONZE, SILVER, etc).
67
+
Because of this, we joined [Open Collective](https://opencollective.com/intelowl-project) to obtain US and EU non-profit equal level status which allows the organization to receive and manage donations transparently and with tax exemption. Please support IntelOwl and all the community by choosing a plan (BRONZE, SILVER, etc).
[Certego](https://certego.net/?utm_source=intelowl) is a MDR (Managed Detection and Response) and Threat Intelligence Provider based in Italy.
80
78
81
-
IntelOwl was born out of Certego's Threat intelligence R&D division and is constantly maintained and updated thanks to them.
79
+
IntelOwl was born out of Certego's Threat intelligence R&D division and is mostly maintained and updated thanks to them.
82
80
83
81
#### The Honeynet Project
84
82
@@ -96,16 +94,6 @@ Since its birth this project has been participating in the [Google Summer of Cod
96
94
If you are interested in participating in the next Google Summer of Code, check all the info available in the [dedicated repository](https://github.com/intelowlproject/gsoc)!
[ThreatHunter.ai®](https://threathunter.ai?utm_source=intelowl), is a 100% Service-Disabled Veteran-Owned Small Business started in 2007 under the name Milton Security Group. ThreatHunter.ai is the global leader in Dynamic Threat Hunting. Operating a true 24x7x365 Security Operation Center with AI/ML-enhanced human Threat Hunters, ThreatHunter.ai has changed the industry in how threats are found, and mitigated in real time. For over 15 years, our teams of Threat Hunters have stopped hundreds of thousands of threats and assisted organizations in defending against threat actors around the clock.
106
-
107
-
### 🥉 BRONZE
108
-
109
97
#### Docker
110
98
111
99
In 2021 IntelOwl joined the official [Docker Open Source Program](https://www.docker.com/blog/expanded-support-for-open-source-software-projects/). This allows IntelOwl developers to easily manage Docker images and focus on writing the code. You may find the official IntelOwl Docker images [here](https://hub.docker.com/search?q=intelowlproject).
0 commit comments