PatrOwl provides scalable, free and open-source solutions for orchestrating Security Operations and providing Threat Intelligence feeds. PatrowlHears is an advanced and real-time Vulnerability Intelligence platform, including CVE, exploits and threats news.
To try PatrowlHears, install it by reading the Installation Guide.
Fully-Developed in Python, PatrowlHears is composed of a backend application using the awesome Django framework and a frontend based on Vue.js + Vuetify. Asynchronous tasks and engine scalability are supported by RabbitMQ and Celery. PatrowlHears features and data are reachable using the embedded WEB interface or using the REST-API.
- PatrowlHearsData: Contains data-scrapper scripts collecting CVE, CPE, CWE and exploit references (cf. CVE-SEARCH project) + raw data as JSON files
- PatrowlHears4py: Python CLI and library for PatrowlHears API.
PatrowlHears is an open source and free software released under the AGPL (Affero General Public License). We are committed to ensure that PatrowlHears will remain a free and open source project on the long-run.
Information, news and updates are regularly posted on Patrowl.io Twitter account.
Please see our Code of conduct. We welcome your contributions. Please feel free to fork the code, play with it, make some patches and send us pull requests via issues.
TBD
Please open an issue on GitHub if you'd like to report a bug or request a feature. We are also available on Gitter to help you out.
If you need to contact the project team, send an email to [email protected].
A commercial Pro Edition is available and officially supported by the PatrOwl company. It includes following extra and awesome engines:
- PatrOwl CSIRT feeds, managed by qualified Cyber-Threat Intelligence analysts
- Terraform+Ansible deployment scripts
- Official Pro Support
PatrowlHears is available on the official SaaS platform. See: https://patrowlhears.io
Looking for advanced support, training, integration, custom developments, dual-licensing ? Contact us at [email protected]
Please disclose any security-related issues or vulnerabilities by emailing [email protected], instead of using the public issue tracker.
Copyright (C) 2020-2022 Nicolas MATTIOCCO (@MaKyOtOx - [email protected])
Branch | Status |
---|---|
master | |
develop |