You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While the original bl2ru performed dns requests to retrieve ip adresses associated with each domain of the domain list given (and thus sometimes duplicating rules), this tool takes another approach and let your TI determine this and only create rules for given input, without trying any enrichment of the data.
10
10
11
11
To ensure maximum efficiency ofthis tool, your upstream Threat Intelligence should take care of:
12
-
-eliminate duplicates
13
-
-enrich data correctly
14
-
-split data (i.e. split conix.fr/nos-expertises/ssi/ in conix.fr and /nos_expertises/ssi)
12
+
- duplicates elimination
13
+
- data enrichment
14
+
- data splitting (i.e. split conix.fr/nos-expertises/ssi/ in conix.fr and /nos_expertises/ssi)
15
15
16
16
# Usage
17
17
```
@@ -27,14 +27,15 @@ optional arguments:
27
27
Output file (default is stdou)
28
28
--ssid SSID, -s SSID Starting sid of the generated rules
29
29
--emitter EMITTER, -e EMITTER
30
-
Emitter of the rules, default: bl2ru2
30
+
Emitter of the rules, default: bl2ru2
31
31
32
32
```
33
33
The input file must be a csv-like file (delimiter is a space) containing the following information, 3 rows :
0 commit comments