Item logo image for IOC Extractor - Malware Bucket

IOC Extractor - Malware Bucket

5.0(

1 rating

)
Item media 4 (screenshot) for IOC Extractor - Malware Bucket
Item media 1 (screenshot) for IOC Extractor - Malware Bucket
Item media 2 (screenshot) for IOC Extractor - Malware Bucket
Item media 3 (screenshot) for IOC Extractor - Malware Bucket
Item media 4 (screenshot) for IOC Extractor - Malware Bucket
Item media 1 (screenshot) for IOC Extractor - Malware Bucket
Item media 1 (screenshot) for IOC Extractor - Malware Bucket
Item media 2 (screenshot) for IOC Extractor - Malware Bucket
Item media 3 (screenshot) for IOC Extractor - Malware Bucket
Item media 4 (screenshot) for IOC Extractor - Malware Bucket

Overview

An extension that extracts IOCs like URLs, IPv4s, filenames, MD5, SHA1, SHA256 hashes, and submits them to threat intel platform

Detailed Description: Extract Indicators of Compromise (IOCs) directly from web pages and seamlessly submit them to your Threat Intelligence (TI) platform. Supports URLs, IP addresses, filenames, MD5, SHA1, and SHA256 hashes. Currently compatible with MISP, with more platforms planned in future updates. Features: • Extract IOCs such as URLs, IPv4 addresses, filenames, MD5, SHA1, and SHA256 hashes from any webpage. • Automatically categorize and display extracted IOCs. • Download IOCs as a plain text file. • Submit extracted IOCs directly to your MISP instance. • Simple configuration to integrate with MISP. • Plans to support additional TI platforms in future releases. How To Use: • Install the extension and open any web page. • Hover over the extension icon to activate and begin IOC extraction. • Choose between: • Downloading extracted IOCs as a text file. Submitting IOCs to your MISP instance: Before submitting to MISP, update the extension settings: MISP URL (e.g., https://your-misp-instance.com) API Key (generate this from your MISP account settings) MISP Configuration Notes (for submission) If you encounter a network error while submitting to MISP, it may be due to CORS restrictions. To resolve this: Open the MISP configuration file: /var/www/MISP/app/Config/config.php Update the setting: “check_sec_fetch_site_header”→ false This will help avoid CORS-related submission issues.

Details

  • Version
    1.0.0
  • Updated
    May 26, 2025
  • Offered by
    Cyberange
  • Size
    161KiB
  • Languages
    English
  • Developer
    Tactical Cyberange Simulations Pvt Ltd.
    A-319, Logix Technova Noida, Uttar Pradesh 201301 IN
    Email
    ansuman@cyberange.io
    Phone
    +91 86381 84952
  • Trader
    This developer has identified itself as a trader per the definition from the European Union and committed to only offer products or services that comply with EU laws.
  • D-U-N-S
    861274734

Privacy

IOC Extractor - Malware Bucket has disclosed the following information regarding the collection and usage of your data. More detailed information can be found in the developer's privacy policy.

IOC Extractor - Malware Bucket handles the following:

User activity
Website content

This developer declares that your data is

  • Not being sold to third parties, outside of the approved use cases
  • Not being used or transferred for purposes that are unrelated to the item's core functionality
  • Not being used or transferred to determine creditworthiness or for lending purposes

Related

CyberGuard - Online Privacy & Security Protection

5.0

Free online security scanner. Detects network threats, unsecured WiFi, trackers, and AI risks. No ads, no tracking, no paywalls.

Pulsedive Threat Intelligence

5.0

Highlight IPs, domains, and URLs on any website to enrich them using Pulsedive's threat intelligence.

SEO Checker by Sekhlo

5.0

Analyze on-page SEO, technical signals, schema, performance, links, SSL, and AI-readiness. Optional APIs add DA/PA and AI tips.

cURL & WS Capture

5.0

cURL & WS Capture help Capture network requests and WebSocket connections.

URL Extractor

5.0

Extract URLs from any webpage with ease

MetaSuites - Builders' Swiss Army Knife

4.9

Integrating 30+ popular Web3 and AI Tools, 300M+ Address Labels, and the Fund Flow Map into a single extension.

Alerte sur les sites GenAI, par Next.ink

4.5

Affiche une alerte sur des sites générés tout ou partie par des IA et détecte les attaques IDN homographes. Liste gérée par Next.ink

Malware & Vulnerability Scanner

0.0

A Chrome extension for scanning files, URLs, and analyzing CVE vulnerabilities

EclecticIQ Threat Scout

5.0

Transform online information on cyber threats into AI-structured and STIX 2.1 compatible data to freely embed in your security tools

URLs Email Extractor PRO

5.0

Extract emails from URLs and Websites with advanced crawling capabilities

Web to MCP: Import any website components to Cursor or Claude Code

4.2

A Chrome extension that captures website components and sends them to AI coding assistants like Cursor, Claude Code, Codex, etc

DataSec Anti-Phishing AI

5.0

DataSec's AI-powered browser extension detects and blocks phishing attempts in real time using advanced security datasets.

CyberGuard - Online Privacy & Security Protection

5.0

Free online security scanner. Detects network threats, unsecured WiFi, trackers, and AI risks. No ads, no tracking, no paywalls.

Pulsedive Threat Intelligence

5.0

Highlight IPs, domains, and URLs on any website to enrich them using Pulsedive's threat intelligence.

SEO Checker by Sekhlo

5.0

Analyze on-page SEO, technical signals, schema, performance, links, SSL, and AI-readiness. Optional APIs add DA/PA and AI tips.

cURL & WS Capture

5.0

cURL & WS Capture help Capture network requests and WebSocket connections.

URL Extractor

5.0

Extract URLs from any webpage with ease

MetaSuites - Builders' Swiss Army Knife

4.9

Integrating 30+ popular Web3 and AI Tools, 300M+ Address Labels, and the Fund Flow Map into a single extension.

Alerte sur les sites GenAI, par Next.ink

4.5

Affiche une alerte sur des sites générés tout ou partie par des IA et détecte les attaques IDN homographes. Liste gérée par Next.ink

Malware & Vulnerability Scanner

0.0

A Chrome extension for scanning files, URLs, and analyzing CVE vulnerabilities

Google apps