diff --git a/docs/IntelOwl/usage.md b/docs/IntelOwl/usage.md index 4fb4b9b..78c86b2 100644 --- a/docs/IntelOwl/usage.md +++ b/docs/IntelOwl/usage.md @@ -260,9 +260,10 @@ The following is the list of the available analyzers you can run out-of-the-box. - `IPQuery`: [IPQuery](https://ipquery.io/) aims to provide a straightforward and simplistic API for working with IP addresses. - `Mullvad_DNS`: [Mullvad_DNS](https://github.com/mullvad/dns-blocklists) is an analyzer that queries Mullvad's DNS-over-HTTPS service (using the "base" endpoint) to check a domain's DNS records. It supports two modes: `query`: returns raw DNS answer data. `malicious`: interprets an NXDOMAIN (rcode==3) as the domain being blocked (i.e., malicious). -_Available from version > 6.3.1_ +###### _Available from version > 6.3.1_ - `BBOT`: [BBOT](https://github.com/blacklanternsecurity/bbot) (Bighuge BLS Open Threat) domain/URL scanner that leverages BBOT's Python library to perform scans with configurable modules and presets. - +- `Debloat`: [Debloat](https://github.com/Squiblydoo/debloat) is a tool to remove excess garbage from bloated executables. + ##### Generic analyzers (email, phone number, etc.; anything really) Some analyzers require details other than just IP, URL, Domain, etc. We classified them as `generic` Analyzers. Since the type of field is not known, there is a format for strings to be followed.