MISP / intelligence-iconsLinks
intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
☆41Updated 6 years ago
Alternatives and similar repositories for intelligence-icons
Users that are interested in intelligence-icons are comparing it to the libraries listed below
Sorting:
- ☆35Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- Specifications used in the MISP project including MISP core format☆52Updated this week
- Python script to automatically create sigma rules from The hive observables☆25Updated 6 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Updated 6 years ago
- ☆13Updated 6 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 4 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆79Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 4 months ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Presentation Slides and Video links☆32Updated 4 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆82Updated 8 months ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- automate your MISP installs☆68Updated 5 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆34Updated this week
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- Hunting IOCs all day every day...☆86Updated 2 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Validates yara rules and tries to repair the broken ones.☆40Updated 5 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago