MISP / misp-training-lea
Practical Information Sharing between Law Enforcement and CSIRT communities using MISP
☆32Updated last year
Alternatives and similar repositories for misp-training-lea
Users that are interested in misp-training-lea are comparing it to the libraries listed below
Sorting:
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆27Updated 3 weeks ago
- A web scraper to create MISP events and reports☆14Updated last month
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated this week
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆32Updated 3 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 5 months ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆16Updated 3 months ago
- A collection of tips for using MISP.☆74Updated 5 months ago
- ☆19Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- Summarize CTI reports with OpenAI☆16Updated last week
- Converting data from services like Censys and Shodan to a common data model☆49Updated 8 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 7 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆142Updated last year
- A home for detection content developed by the delivr.to team☆69Updated 3 months ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Updated 2 weeks ago
- Offensive Research Guide to Help Defense Improve Detection☆31Updated 2 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆12Updated 2 years ago
- Hashes of infamous malware☆26Updated last year
- Python based CLI for MalwareBazaar☆37Updated 6 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 3 months ago
- An open source platform to support analysts to organise their case and tasks☆71Updated last week
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Cyber Underground General Intelligence Requirements☆92Updated last year