DCSO / MISP-dockerizedLinks
☆34Updated 5 years ago
Alternatives and similar repositories for MISP-dockerized
Users that are interested in MISP-dockerized are comparing it to the libraries listed below
Sorting:
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 4 years ago
- InvestigationPlaybookSpec☆72Updated 8 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Python IOC Editor☆63Updated 10 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆81Updated 4 years ago
- A utility repo to assist with converting between MISP and STIX formats☆69Updated 4 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Web based Manager for Yara Rules☆58Updated 5 years ago
- A Yara rule generator for finding related samples and hunting☆159Updated 3 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 4 years ago
- Community modules for FAME☆65Updated last month
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆91Updated 8 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆87Updated 3 years ago
- Django web interface for managing Yara rules☆196Updated 7 years ago
- Splunk integration with MISP☆12Updated 7 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆141Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago