MISP / PyMISPWarningLists
Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists
☆33Updated 3 months ago
Alternatives and similar repositories for PyMISPWarningLists:
Users that are interested in PyMISPWarningLists are comparing it to the libraries listed below
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆19Updated 5 months ago
- Python module to use the MISP Taxonomies☆29Updated last month
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- ☆24Updated 2 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 4 months ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 3 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 8 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 7 months ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 7 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- ☆14Updated 6 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- command line tool to use the DNSDB Flexible Search API extensions.☆16Updated 9 months ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated last month
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago
- ☆33Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆61Updated last year
- the fastest way to consume threat intelligence.☆29Updated 2 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago