MISP / misp-sighting-serverLinks
MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indicators) in a space efficient way.
☆15Updated last year
Alternatives and similar repositories for misp-sighting-server
Users that are interested in misp-sighting-server are comparing it to the libraries listed below
Sorting:
- Fast lookup server for NSRL and other hash database used in digital forensic☆48Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- A web scraper to create MISP events and reports☆17Updated 5 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated 4 months ago
- ☆23Updated 2 years ago
- ☆14Updated 7 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- A collection of my public YARA signatures for various malware families☆30Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- Yara rules☆21Updated 2 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆28Updated 4 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated 2 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated 3 months ago
- Integration between MISP platform and McAfee MVISION EDR☆14Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- ☆24Updated 3 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- ☆15Updated 4 years ago
- Collection of scripts used to analyse malware or emails☆20Updated 5 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆12Updated last year
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 2 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- ☆36Updated 2 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year