MISP / best-practices-in-threat-intelligence
Best practices in threat intelligence
☆46Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for best-practices-in-threat-intelligence
- Expert Investigation Guides☆50Updated 3 years ago
- Specifications used in the MISP project including MISP core format☆46Updated last month
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 3 years ago
- A collection of notebooks built for defensive and offensive operations.☆76Updated 4 years ago
- For storing of the volumes☆3Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- Home to the ActorTrackr source code☆27Updated 7 years ago
- Presentation Slides and Video links☆31Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- misp-cloud - Cloud-ready images of MISP☆72Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆53Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆34Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Deploy MISP Project software with Vagrant.☆42Updated 4 years ago
- A collection of typical false positive indicators☆54Updated 3 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- CARET - A tool for viewing cyber analytic relationships☆53Updated 4 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated last year
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- ☆12Updated 5 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆58Updated last year
- Converting data from services like Censys and Shodan to a common data model☆48Updated 2 months ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- ☆14Updated 4 years ago