Untitled conversation
Intel Pivoter
FURKAN CALISKAN
40+
Conversations
Receives domains as inputs and tries to find common patterns from their metadata to discover malware infrastructure