Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'ail'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 1 result

  1. AIL framework - Analysis Information Leak framework AIL is a modular framework to analyse potential information leaks from unstructured data sources like pastes from Pastebin or similar services or unstructured data streams. AIL framework is flexible and can be extended to support other functionalities to mine or process sensitive information (e.g. data leak prevention). Video Demo Features Modular architecture to handle streams of unstructured or structured information Default support for external ZMQ feeds, such as provided by CIRCL or other providers Multiple feed support Each module can process and reprocess the information already processed by AIL Detecting and extracting URLs including their geographical location (e.g. IP address location) Extracting and validating potential leak of credit cards numbers, credentials, ... Extracting and validating email addresses leaked including DNS MX validation Module for extracting Tor .onion addresses (to be further processed for analysis) Keep tracks of duplicates (and diffing between each duplicate found) Extracting and validating potential hostnames (e.g. to feed Passive DNS systems) A full-text indexer module to index unstructured information Statistics on modules and web Real-time modules manager in terminal Global sentiment analysis for each providers based on nltk vader module Terms, Set of terms and Regex tracking and occurrence Many more modules for extracting phone numbers, credentials and others Alerting to MISP to share found leaks within a threat intelligence platform using MISP standard Detect and decode encoded file (Base64, hex encoded or your own decoding scheme) and store files Detect Amazon AWS and Google API keys Detect Bitcoin address and Bitcoin private keys Detect private keys, certificate, keys (including SSH, OpenVPN) Detect IBAN bank accounts Tagging system with MISP Galaxy and MISP Taxonomies tags UI paste submission Create events on MISP and cases on The Hive Automatic paste export at detection on MISP (events) and The Hive (alerts) on selected tags Extracted and decoded files can be searched by date range, type of file (mime-type) and encoding discovered Graph relationships between decoded file (hashes), similar PGP UIDs and addresses of cryptocurrencies Tor hidden services crawler to crawl and parse output Tor onion availability is monitored to detect up and down of hidden services Browser hidden services are screenshot and integrated in the analysed output including a blurring screenshot interface (to avoid "burning the eyes" of the security analysis with specific content) Tor hidden services is part of the standard framework, all the AIL modules are available to the crawled hidden services Generic web crawler to trigger crawling on demand or at regular interval URL or Tor hidden services Screenshots More info & Download : [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.