MISP / misp-wireshark
Lua plugin to extract data from Wireshark and convert it into MISP format
☆47Updated last year
Alternatives and similar repositories for misp-wireshark:
Users that are interested in misp-wireshark are comparing it to the libraries listed below
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- ☆15Updated 3 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated 3 weeks ago
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆32Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated last month
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 2 months ago
- DNS Dashboard for hunting and identifying beaconing☆15Updated 4 years ago
- A web scraper to create MISP events and reports☆14Updated this week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Project to Support The Hunter's Framework (THF)☆11Updated last year
- Hunt for SQLite files used by various applications☆23Updated 3 weeks ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Open-source Fabric templates for cybersecurity and compliance☆16Updated 3 months ago
- Ransomware Simulator for Red/Blue teams to test their defences.☆19Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- DEFCON 31 slide deck and video link☆58Updated 9 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated this week
- Dissect triage script for Citrix NetScaler devices☆23Updated 9 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A collection of tips for using MISP.☆74Updated 4 months ago
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- ☆28Updated 3 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 8 months ago
- Living off the False Positive!☆35Updated 2 months ago
- create a "simulated internet" cyber range environment☆16Updated 3 weeks ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 3 months ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15Updated last year