Untitled conversation

Intel Pivoter

FURKAN CALISKAN
40+
Conversations
Receives domains as inputs and tries to find common patterns from their metadata to discover malware infrastructure