IntelOwl
IntelOwl: manage your Threat Intelligence at scale
Install / Use
/learn @intelowlproject/IntelOwlREADME
Intel Owl
Do you want to get threat intelligence data about a malware, an IP address or a domain? Do you want to get this kind of data from multiple sources at the same time using a single API request?
You are in the right place!
IntelOwl is an Open Source solution for management of Threat Intelligence at scale. It integrates a number of analyzers available online and a lot of cutting-edge malware analysis tools.
Features
This application is built to scale out and to speed up the retrieval of threat info.
It provides:
- Enrichment of Threat Intel for files as well as observables (IP, Domain, URL, hash, etc).
- A Fully-fledged REST APIs written in Django and Python.
- An easy way to be integrated in your stack of security tools to automate common jobs usually performed, for instance, by SOC analysts manually. (Thanks to the official libraries pyintelowl and go-intelowl)
- A built-in GUI: provides features such as dashboard, visualizations of analysis data, easy to use forms for requesting new analysis, etc.
- A framework composed of modular components called Plugins:
- analyzers that can be run to either retrieve data from external sources (like VirusTotal or AbuseIPDB) or to generate intel from internally available tools (like Yara or Oletools)
- connectors that can be run to export data to external platforms (like MISP or OpenCTI)
- pivots that are designed to trigger the execution of a chain of analysis and connect them to each other
- visualizers that are designed to create custom visualizations of analyzers results in the GUI
- ingestors that allow to automatically ingest stream of observables or files to IntelOwl itself
- playbooks that are meant to make analysis easily repeatable
- data models to map the different data extracted from analyzers to a single common schema
- A starting point for analysts' Investigations: users can register their findings, correlate the information found, and collaborate...all in a single place
Documentation
We try hard to keep our documentation well written, easy to understand and always updated. All info about installation, usage, configuration and contribution can be found here
Publications and Media
To know more about the project and its growth over time, you may be interested in reading the official blog posts and/or videos about the project by clicking on this link
Available services or analyzers
You can see the full list of all available analyzers in the documentation.
| Type | Analyzers Available | | -------------------------------------------------- |---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | Inbuilt modules | - Static Office Document, RTF, PDF, PE, ELF, APK File Analysis and metadata extraction<br/> - Strings Deobfuscation and analysis (FLOSS, Stringsifter, ...)<br/> - Yara, ClamAV (a lot of public rules are available. You can also add your own rules)<br/> - PE Emulation with Qiling and Speakeasy<br/> - PE Signature verification<br/> - PE Capabilities Extraction (CAPA and Blint)<br/> - Javascript Emulation (Box-js)<br/> - Android Malware Analysis (Quark-Engine, Androguard, Mobsf, ...)<br/> - SPF and DMARC Validator<br/> - PCAP Analysis with Suricata and Hfinger <br/> - Honeyclients (Thug, Selenium) <br/> - Scanners (WAD, Nuclei, ...) <br/> - more... | | External services | - Abuse.ch <a href="https://bazaar.abuse.ch/about/" target="_blank">MalwareBazaar</a>/<a href="https://urlhaus.abuse.ch/" target="_blank">URLhaus</a>/<a href="https://threatfox.abuse.ch/about/" target="_blank">Threatfox</a>/<a href="https://yaraify.abuse.ch/about/" target="_blank">YARAify</a></br> - <a href="https://docs.greynoise.io/docs/3rd-party-integrations" target="_blank"> GreyNoise v2</a><br/> - <a href="https://analyze.intezer.com/?utm_source=IntelOwl" target="_blank"> Intezer</a><br/> - VirusTotal v3<br/> - <a href="https
Related Skills
node-connect
325.6kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
openai-image-gen
325.6kBatch-generate images via OpenAI Images API. Random prompt sampler + `index.html` gallery.
claude-opus-4-5-migration
80.2kMigrate prompts and code from Claude Sonnet 4.0, Sonnet 4.5, or Opus 4.1 to Opus 4.5
frontend-design
80.2kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
