Building a Threat Intelligence Feed using the Twitter API and a bit of code

A few examples

curl --silent | jq
curl --silent | jq -r '.malicious_urls | .[]'

Generating a list of IP addresses from the most reported URLs

curl --silent | jq '.malicious_ips |  .[]?' -r | sort | uniq -c | sort -nr

Generating a list of top contributors of malicious URLs.

curl --silent | jq -r .username | sort | uniq -c | sort -nr




Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How To Claim Your PARA Rewards

Avoid Being Tracked Online? Ditch Google For DuckDuckGo

General-Purpose Layer 2 Static-Calls Proposal Presentation by Vitalik Buterin at ENS Online…

{UPDATE} Princess Fashion Resort Hack Free Resources Generator

CyberGorillas: The Resurgence

Collaboration of the arch rivals

{UPDATE} Найди ошибку Hack Free Resources Generator

Network security learning route

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Stefan Grimminck

Stefan Grimminck

More from Medium

Microsoft, Apple, and Google Join Forces to Kill the Password

Firewall Evasion Techniques using Nmap

Follina — a Microsoft Office code execution vulnerability

Nmap Advanced Port Scans | TryHackMe (THM)