MISP / intelligence-iconsLinks
intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
☆41Updated 6 years ago
Alternatives and similar repositories for intelligence-icons
Users that are interested in intelligence-icons are comparing it to the libraries listed below
Sorting:
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆65Updated 2 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 5 months ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- Python script to automatically create sigma rules from The hive observables☆25Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 2 years ago
- ☆13Updated 6 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- A collection of typical false positive indicators☆55Updated 5 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 5 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- ☆35Updated 4 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- Specifications used in the MISP project including MISP core format☆53Updated last month
- Validates yara rules and tries to repair the broken ones.☆40Updated 5 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Updated 6 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 2 months ago
- ☆24Updated 3 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Updated 5 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Updated 2 years ago
- Exports MISP events to STIX and ingest into McAfee ESM☆15Updated 5 years ago