0xtf / testmynids.org
A website and framework for testing NIDS detection
☆56Updated 3 years ago
Related projects: ⓘ
- A Splunk app to use MISP in background☆109Updated 8 months ago
- ☆48Updated 4 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆106Updated 4 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆121Updated 3 years ago
- Miscelaneous Dockers☆46Updated 3 years ago
- automate your MISP installs☆66Updated 4 years ago
- Scripts for TheHive.☆22Updated 4 years ago
- Sigma Detection Rule Repository☆84Updated 4 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆41Updated 8 years ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆92Updated 2 years ago
- ☆34Updated 3 years ago
- Threat Alert Logic Repository☆88Updated 5 years ago
- ☆78Updated 4 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 3 years ago
- A Splunk app with saved reports derived from Sigma rules☆72Updated 6 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- InvestigationPlaybookSpec☆72Updated 6 years ago
- misp-cloud - Cloud-ready images of MISP☆70Updated 2 years ago
- FRAC and RIFT☆17Updated 5 years ago
- ☆33Updated 4 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 2 years ago
- ☆20Updated this week
- Deploy and maintain Symon through the Splunk Deployment Sever☆31Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆105Updated 4 years ago
- Log Entry to Sigma Rule Converter☆105Updated 2 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆66Updated 3 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆82Updated 3 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Updated 4 years ago