NUKIB / mispLinks
Docker image for MISP
☆130Updated last week
Alternatives and similar repositories for misp
Users that are interested in misp are comparing it to the libraries listed below
Sorting:
- Convert Sigma rules to Wazuh rules☆67Updated last year
- A production ready Dockered MISP☆246Updated 2 weeks ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆151Updated 3 months ago
- Docker image for Velocidex Velociraptor☆128Updated 3 months ago
- Rules generated from our investigations.☆195Updated last week
- MISP Docker (XME edition)☆282Updated last year
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated 2 months ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated last week
- A (nearly) production ready Dockered MISP☆232Updated last year
- An opensource sigma conversion tool built using pysigma☆130Updated 2 weeks ago
- The Sigma command line interface based on pySigma☆158Updated 2 months ago
- A curated list of awesome things related to TheHive & Cortex☆180Updated 3 years ago
- MISP Playbooks☆203Updated last week
- OpenCTI Docker deployment helpers☆186Updated this week
- User guide of MISP☆270Updated 5 months ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆93Updated 3 years ago
- Zeek-Formatted Threat Intelligence Feeds☆370Updated this week
- Dettectinator - The Python library to your DeTT&CT YAML files.☆114Updated 2 months ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆216Updated 2 weeks ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated last week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆256Updated 3 months ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆134Updated last year
- ☆71Updated 2 months ago
- Cleanup of older MISP events can require some work until now☆26Updated 2 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 11 months ago
- Resources To Learn And Understand SIGMA Rules☆177Updated 2 years ago