Threat Intel Walkthrough
Recorded demo of the SecIntel.ThreatIntel family of PowerShell
modules — a unified wrapper around AbuseIPDB, urlscan.io, NIST NVD,
Team Cymru hash lookup, and the NSRL hash database.
Walkthrough recording
A short screen recording will live here showing a full IP and hash lookup against the live module.
- Run a 30–60 second capture of
Invoke-IpLookup 8.8.8.8followed byInvoke-HashLookup 44d88612fea8a8f36de82e1278abb02fusing OBS or ScreenToGif. - Save as
walkthrough.mp4(or.gif) in/lab/threat-intel/. - Replace this entire
<div class="ti-recording-slot">with a<video controls src="/lab/threat-intel/walkthrough.mp4">tag (or<img>for GIF). - If using video, add
preload="metadata" mutedso it doesn't auto-buffer or auto-play.
What the modules do
Reputation scoring for IPv4 addresses. Returns abuse confidence score, country, ISP, usage type, and recent reports. Caches responses to disk to avoid repeated calls during an investigation.
Submit URLs to urlscan.io and read back the verdict (malicious / suspicious / benign), screenshot URL, and detected technologies. Async-capable for batched submissions.
NIST NVD CVE detail lookups. Pulls description, CVSS scores (v2 + v3), affected configurations, and references for any CVE ID.
Hash reputation via Team Cymru's Malware Hash Registry. Quick sanity check for files you've pulled from a host during an investigation.
NSRL (NIST RDS) hash lookup — the inverse: known-good files. Useful for filtering benign system files out of large hash sets during forensics triage.