MISP / intelligence-iconsLinks
intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
☆41Updated 6 years ago
Alternatives and similar repositories for intelligence-icons
Users that are interested in intelligence-icons are comparing it to the libraries listed below
Sorting:
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Specifications used in the MISP project including MISP core format☆52Updated this week
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- ☆35Updated 4 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- Python script to automatically create sigma rules from The hive observables☆25Updated 6 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 4 years ago
- ☆13Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆49Updated 2 months ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Updated 6 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated this week
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- automate your MISP installs☆68Updated 5 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆79Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 3 months ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆65Updated 2 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- MISP website (hugo-based)☆25Updated 2 weeks ago
- Python module to use the MISP Taxonomies☆30Updated last month
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago