MISP / misp-rfcLinks
Specifications used in the MISP project including MISP core format
☆52Updated 3 weeks ago
Alternatives and similar repositories for misp-rfc
Users that are interested in misp-rfc are comparing it to the libraries listed below
Sorting:
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆34Updated last week
- Definition, description and relationship types of MISP objects☆104Updated this week
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- A collection of typical false positive indicators☆55Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- ☆15Updated 7 years ago
- InvestigationPlaybookSpec☆72Updated 8 years ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆46Updated 3 years ago
- Hunting IOCs all day every day...☆87Updated 2 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20Updated 3 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆42Updated 2 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 8 years ago
- Python module to use the MISP Taxonomies☆31Updated 2 weeks ago
- Python IOC Editor☆64Updated 10 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Updated last year
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 10 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Best practices in threat intelligence☆49Updated 3 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆82Updated 2 weeks ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- ☆34Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 2 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆67Updated 2 years ago
- MISP Workbench☆28Updated 9 years ago