Skip to content

HellCatLabs/ioc-extractor-lite

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

2 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

ioc-extractor-lite

๐Ÿ› ๏ธ Your mission: Build a simple Python script that extracts IOCs from a raw log file.

๐Ÿงช What you'll detect

  • IP addresses (IPv4)
  • Domain names
  • URLs (http/https)
  • File hashes (MD5, SHA1, SHA256)

๐Ÿš€ Instructions

  1. Check the file: logs/sample.log
  2. Use the a Python script: extractor.py
  3. Use regex to extract IOCs from the file
  4. Print the results in a clean format (optional: sort or deduplicate them)

Need help? Check DONOTREADME.md (but only if you're stuck ๐Ÿ˜‰)

๐Ÿงฉ Bonus ideas

  • Save the IOCs to a file
  • Add CLI args with argparse

๐Ÿ“š Resources

๐ŸŽ‰ Happy coding!

Thanks for the contributors:

About

๐Ÿ› ๏ธ Lightweight CLI tool to extract IOCs (Indicators of Compromise) from raw log files. Supports IP addresses, domains, URLs, and common hash formats. Ideal for beginner SOC analysts and automation scripting.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages