SentinelIOC is a defensive IOC scanner that correlates local host artifacts against curated indicators of compromise.
- Import IOCs from JSON or CSV
- Store IOCs in SQLite
- Scan files by SHA256 hash
- Check running processes
- Scan basic startup / persistence locations
- Generate JSON reports
- Clean terminal output with Rich
- Safe by default: report-only behavior
hash_sha256filenamefilepath
pip install -e .pip install -r requirements-dev.txtsentinelioc init-db
sentinelioc import-iocs --file examples/sample_iocs.json
sentinelioc scan --path ./examples/test_data --output report.json
sentinelioc scan-processes --output process_report.json
sentinelioc scan-startup --output startup_report.json
sentinelioc full-scan --path ./examples/test_data --output full_report.json[
{
"type": "filename",
"value": "suspicious.exe",
"confidence": 45,
"source": "sample_feed",
"threat_name": "TestFamily"
}
]- defensive-only host analysis
- clear and explainable results
- minimal false positives
- modular CLI architecture
SentinelIOC is a defensive security tool for analysis and reporting. It does not delete files automatically.
- V1: IOC import, file scan, process scan, JSON reporting
- V2: startup/persistence scanning, IOC deduplication, better confidence handling
- V3: YARA support, HTML reports, AI-assisted IOC enrichment
Build the package with:
python -m build