
Threat intelligence that works for you.
Research threats, generate detection rules, deliver reports — all through Discord or Telegram.
Ask Actioner to research any threat. It creates a thread, investigates primary sources, extracts IOCs, maps MITRE ATT&CK TTPs, and delivers a structured report. Send follow-ups while it works: a fast chat agent responds in seconds, the research agent keeps going.
RSS feeds scanned every 2 hours. When something critical drops (APTs, zero-days, active exploitation), Actioner wakes up and starts researching before you even see the advisory. Most scans cost nothing.
Everything from the last 24 hours, compiled into an executive summary and delivered at your configured time. Top items by severity, IOC counts, detection rules generated. Quiet days get a one-liner.
Sigma, YARA, Snort, and Suricata rules generated and validated with real CLI tools inside the container. Failed rules retry up to 3 times. Nothing is silently dropped.
Ask Actioner to research any threat. It creates a thread, investigates primary sources, extracts IOCs, maps MITRE ATT&CK TTPs, and delivers a structured report. Send follow-ups while it works: a fast chat agent responds in seconds, the research agent keeps going.
RSS feeds scanned every 2 hours. When something critical drops (APTs, zero-days, active exploitation), Actioner wakes up and starts researching before you even see the advisory. Most scans cost nothing.
Everything from the last 24 hours, compiled into an executive summary and delivered at your configured time. Top items by severity, IOC counts, detection rules generated. Quiet days get a one-liner.
Sigma, YARA, Snort, and Suricata rules generated and validated with real CLI tools inside the container. Failed rules retry up to 3 times. Nothing is silently dropped.
Threat intelligence reports from Actioner's automated research pipeline.
North Korean state-sponsored compromise of axios. Cross-platform RAT via postinstall hook.
Unpatched TOCTOU race condition in Defender. Full PoC public, no patch.
Cascading compromise of Trivy, KICS, LiteLLM, and 47+ npm packages.
UK retail attacks, aviation targeting, and DragonForce ransomware pivot.
$1.5B Bybit heist, Medusa ransomware, developer supply chain attacks.
git clone https://github.com/ThomasPark20/Aegis.git
cd Aegis
claude
/setupSetup handles everything: dependencies, Docker, API keys, Discord bot, feed scanning, and daily reports.