MISP / intelligence-iconsLinks
intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
☆41Updated 6 years ago
Alternatives and similar repositories for intelligence-icons
Users that are interested in intelligence-icons are comparing it to the libraries listed below
Sorting:
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- A collection of typical false positive indicators☆55Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago
- ☆13Updated 5 years ago
- Python script to automatically create sigma rules from The hive observables☆25Updated 6 years ago
- MISP website (hugo-based)☆24Updated last week
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 6 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- Specifications used in the MISP project including MISP core format☆51Updated last month
- misp-cloud - Cloud-ready images of MISP☆73Updated 3 years ago
- the fastest way to consume threat intelligence.☆31Updated 2 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆64Updated last year
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Hunting IOCs all day every day...☆86Updated last year
- automate your MISP installs☆68Updated 5 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated last month
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- Expert Investigation Guides☆52Updated 4 years ago
- Best practices in threat intelligence☆48Updated 2 years ago
- ☆35Updated 4 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Repository of yara rules☆60Updated 2 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago