MISP / PyMISPWarningLists
Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists
☆32Updated last week
Alternatives and similar repositories for PyMISPWarningLists:
Users that are interested in PyMISPWarningLists are comparing it to the libraries listed below
- Python module to use the MISP Taxonomies☆29Updated last month
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆19Updated 2 months ago
- ☆24Updated 2 years ago
- Scripts for accessing and transforming cyber threat intelligence☆25Updated 9 years ago
- Specifications used in the MISP project including MISP core format☆51Updated last month
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 7 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆57Updated last year
- ☆14Updated 6 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 4 months ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 4 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Updated 6 months ago
- ☆33Updated 4 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 7 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated last year
- Converting data from services like Censys and Shodan to a common data model☆49Updated 5 months ago
- the fastest way to consume threat intelligence.☆29Updated last year