MISP / yara-misp
Export MISP attributes in Yara
☆12Updated 7 years ago
Alternatives and similar repositories for yara-misp:
Users that are interested in yara-misp are comparing it to the libraries listed below
- Integration between MISP platform and McAfee MVISION EDR☆14Updated 2 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Automated OpenDXL Output information via IntelMQ☆14Updated 7 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 7 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 7 years ago
- ☆24Updated 2 years ago
- Virustotal Data to Timesketch☆17Updated 5 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- ☆15Updated 6 years ago
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆19Updated 2 months ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- ☆14Updated 6 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 8 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- Some rules, scripts of some use to us☆9Updated 3 months ago
- This repository regroups the Yara Rules for the Unprotect Project☆24Updated 4 years ago
- A collection of my public YARA signatures for various malware families☆29Updated 4 months ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated 3 weeks ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Updated 9 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆19Updated last year
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Steezy - Ghetto Yara Generation☆15Updated last year
- Event Log Analysis Tools☆29Updated 8 years ago
- onigiri - remote malware triage script☆25Updated 9 years ago
- Python module to use the MISP Taxonomies☆29Updated 2 weeks ago
- Home to the ActorTrackr source code☆28Updated 7 years ago