MISP / intelligence-iconsLinks
intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
☆41Updated 6 years ago
Alternatives and similar repositories for intelligence-icons
Users that are interested in intelligence-icons are comparing it to the libraries listed below
Sorting:
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Exports MISP events to STIX and ingest into McAfee ESM☆15Updated 5 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20Updated 3 years ago
- Specifications used in the MISP project including MISP core format☆51Updated last week
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Python module to use the MISP Taxonomies☆29Updated 3 weeks ago
- Python script to automatically create sigma rules from The hive observables☆25Updated 6 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- ☆35Updated 4 years ago
- ☆29Updated this week
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- ☆24Updated 2 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆48Updated last year
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Updated 9 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆63Updated last year
- misp-cloud - Cloud-ready images of MISP☆73Updated 2 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated last week
- Expert Investigation Guides☆52Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Updated 5 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Updated 4 months ago