MISP / misp-training
MISP trainings, threat intel and information sharing training materials with source code
☆389Updated this week
Related projects ⓘ
Alternatives and complementary repositories for misp-training
- User guide of MISP☆259Updated last month
- Modules for expansion services, enrichment, import and export in MISP and other tools.☆345Updated this week
- Python library using the MISP Rest API☆445Updated this week
- MISP Docker (XME edition)☆283Updated 11 months ago
- Cortex Analyzers Repository☆434Updated last week
- Splunk code (SPL) for serious threat hunters and detection engineers.☆266Updated 10 months ago
- A set of Zeek scripts to detect ATT&CK techniques.☆565Updated 4 months ago
- DFIRTrack - The Incident Response Tracking Application☆482Updated 2 months ago
- Python API Client for TheHive☆218Updated last week
- A (nearly) production ready Dockered MISP☆230Updated 10 months ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆407Updated last year
- A curated list of awesome things related to TheHive & Cortex☆173Updated 3 years ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆531Updated this week
- Documentation of TheHive☆393Updated last year
- Actionable analytics designed to combat threats☆972Updated 2 years ago
- Sigma rules from Joe Security☆203Updated 2 weeks ago
- A knowledge base of actionable Incident Response techniques☆614Updated 2 years ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆582Updated 11 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆767Updated last year
- CASCADE Server☆264Updated last year
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆556Updated 5 months ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆350Updated 4 years ago
- A Python package to interact with the Mitre ATT&CK Framework☆468Updated last year
- Repository of YARA rules made by Trellix ATR Team☆570Updated 11 months ago
- Splunk Boss of the SOC version 2 dataset.☆358Updated 2 years ago
- ☆168Updated 4 months ago
- Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.☆264Updated this week
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆346Updated 3 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,138Updated last year
- Defanged Indicator of Compromise (IOC) Extractor.☆506Updated 2 months ago