Secret detection, IOC extraction, and supply chain attack identification. From reconnaissance to report, fully automated.
46 regex-based rules covering AWS keys, GitHub tokens, database credentials, reverse shells, crypto mining, and supply chain patterns.
Shannon entropy, file context classification, assignment detection, and placeholder filtering. Scores 0.0-1.0 with intelligent routing.
Automatically decodes Base64, hex, URL-encoded, and character array obfuscated secrets and IOCs.
Crosses findings in the same file. Code that fetches external payload and executes it becomes a single HIGH severity alert.
Integrates with VirusTotal, Shodan, AbuseIPDB, URLHaus, MalwareBazaar. All optional, works fully offline.
Summarize findings with Ollama. No data leaves your machine. Supports any local model.
cargo add threatdeflect-core use threatdeflect_core::SecretAnalyzer; let analyzer = SecretAnalyzer::new(rules, vec![])?; let result = analyzer.analyze_content( content, "src/config.py", "config.py" );
# Install pip install threatdeflect # Scan a repository threatdeflect repo https://github.com/org/repo # Analyze IOCs threatdeflect ioc 8.8.8.8 https://suspicious.com # With AI summary threatdeflect repo https://github.com/org/repo --ai llama3