Skip to content

Commit c476471

Browse files
committed
update README.md
1 parent e0c10cb commit c476471

File tree

1 file changed

+4
-18
lines changed

1 file changed

+4
-18
lines changed

README.md

Lines changed: 4 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Intel Owl is an Open Source Intelligence, or OSINT solution to get threat intell
2323
- It can be integrated easily in your stack of security tools ([pyintelowl](https://github.com/intelowlproject/pyintelowl)) to automate common jobs usually performed, for instance, by SOC analysts manually.
2424
- Intel Owl is composed of **analyzers** that can be run to retrieve data from external sources (like VirusTotal or AbuseIPDB) or to generate intel from internal analyzers (like Yara or Oletools)
2525
- API written in Django and Python 3.7.
26-
- Inbuilt frontend client: **[IntelOwl-ng](https://github.com/intelowlproject/IntelOwl-ng)** provides features such as dashboard, visualizations of analysis data, easy to use forms for requesting new analysis, etc.
26+
- Inbuilt frontend client: **[IntelOwl-ng](https://github.com/intelowlproject/IntelOwl-ng)** provides features such as dashboard, visualizations of analysis data, easy to use forms for requesting new analysis, etc. [Live Demo](https://intelowlclient.firebaseapp.com/).
2727

2828
## Documentation
2929

@@ -43,23 +43,9 @@ To know more about the project and it's growth over time, you may be interested
4343

4444
You can see the full list of all available analyzers, [here](https://intelowl.readthedocs.io/en/latest/Usage.html#available-analyzers).
4545

46-
**Inbuilt modules**
47-
48-
- Static Document, RTF, PDF, PE, Generic File Analysis
49-
- Strings analysis with ML
50-
- PE Emulation with Speakeasy
51-
- PE Signature verification
52-
- PE Capabilities Extraction
53-
- Emulated Javascript Analysis
54-
- Android Malware Analysis
55-
- SPF and DMARC Validator
56-
- more...
57-
58-
**Free modules that require additional configuration**:
59-
60-
- Cuckoo (requires at least one working Cuckoo instance)
61-
- MISP (requires at least one working MISP instance)
62-
- Yara (Community, Neo23x0, Intezer and McAfee rules are already available. There's the chance to add your own rules)
46+
| Inbuilt modules | External Services | Free modules that require additional configuration |
47+
|- |- |- |
48+
| - Static Document, RTF, PDF, PE, Generic File Analysis<br>- Strings analysis with ML<br>- PE Emulation with Speakeasy<br>- PE Signature verification<br>- PE Capabilities Extraction<br>- Emulated Javascript Analysis<br>- Android Malware Analysis<br>- SPF and DMARC Validator<br>- more... | - GreyNoise v2<br>- Intezer Scan<br>- VirusTotal v2+v3<br>- HybridAnalysis<br>- Censys.io<br>- Shodan<br>- AlienVault OTX<br>- Threatminer<br>- Abuse.ch<br>- many more.. | - Cuckoo (requires at least one working Cuckoo instance)<br>- MISP (requires at least one working MISP instance)<br>- Yara (Community, Neo23x0, Intezer and McAfee rules are already available. There's the chance to add your own rules) |
6349

6450
## Legal notice
6551

0 commit comments

Comments
 (0)