MISP / misp-warninglistsLinks
Warning lists to inform users of MISP about potential false-positives or other information in indicators
☆575Updated 3 weeks ago
Alternatives and similar repositories for misp-warninglists
Users that are interested in misp-warninglists are comparing it to the libraries listed below
Sorting:
- Cortex Analyzers Repository☆460Updated last week
- MISP Docker (XME edition)☆282Updated last year
- Zeek-Formatted Threat Intelligence Feeds☆367Updated this week
- MISP trainings, threat intel and information sharing training materials with source code☆408Updated last week
- A set of Zeek scripts to detect ATT&CK techniques.☆593Updated 11 months ago
- Modules for expansion services, enrichment, import and export in MISP and other tools.☆354Updated last week
- Defanged Indicator of Compromise (IOC) Extractor.☆531Updated 9 months ago
- Python library using the MISP Rest API☆465Updated 3 weeks ago
- Repository of YARA rules made by Trellix ATR Team☆596Updated 2 months ago
- ReversingLabs YARA Rules☆819Updated last month
- DFIRTrack - The Incident Response Tracking Application☆498Updated 9 months ago
- User guide of MISP☆268Updated 5 months ago
- Extract and aggregate threat intelligence.☆865Updated last year
- Standard-Format Threat Intelligence Feeds☆115Updated this week
- Online hash checker for Virustotal and other services☆825Updated 2 months ago
- Python API Client for TheHive☆226Updated this week
- A (nearly) production ready Dockered MISP☆231Updated last year
- Documentation of TheHive☆397Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆408Updated last week
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆375Updated 3 years ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆309Updated last week
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,157Updated last year
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆717Updated 2 months ago
- Cyber Analytics Repository☆939Updated 3 weeks ago
- Sophos-originated indicators-of-compromise from published reports☆594Updated last week
- Actionable analytics designed to combat threats☆988Updated 3 years ago
- A knowledge base of actionable Incident Response techniques☆637Updated 3 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆276Updated last year
- Threat Hunting queries for various attacks☆236Updated this week