MISP / misp-training-leaLinks
Practical Information Sharing between Law Enforcement and CSIRT communities using MISP
☆33Updated last year
Alternatives and similar repositories for misp-training-lea
Users that are interested in misp-training-lea are comparing it to the libraries listed below
Sorting:
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 2 weeks ago
- A web scraper to create MISP events and reports☆16Updated last month
- A collection of tips for using MISP.☆74Updated 7 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated this week
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- AIL project training materials☆34Updated 3 weeks ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- TAPIR is a multi-user, client/server, incident response framework☆44Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 8 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆55Updated 3 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- Resources, tools and utilities about Threat Intelligence☆69Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 3 months ago
- An open source platform to support analysts to organise their case and tasks☆95Updated last week
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆143Updated last year
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 6 months ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 3 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last month
- Converting data from services like Censys and Shodan to a common data model☆50Updated last month
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Cyber Underground General Intelligence Requirements☆94Updated last year
- ☆19Updated 3 years ago
- The core backend server handling API requests and task management☆43Updated this week
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆104Updated last year