Check IOC provided by a MISP instance on Suricata events
☆18Jun 4, 2019Updated 6 years ago
Alternatives and similar repositories for surimisp
Users that are interested in surimisp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Apr 25, 2021Updated 4 years ago
- ☆14May 30, 2018Updated 7 years ago
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 10 years ago
- PPT of my talks.☆13Jun 23, 2025Updated 9 months ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Updated this week
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- Specifications used in the MISP project including MISP core format☆53Jan 7, 2026Updated 3 months ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 9 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated 2 years ago
- Global Security Database Tools☆43Dec 13, 2023Updated 2 years ago
- ddos-checker is a tool used to perform a test on a website from a DDOS attack to find security gaps in a website.☆13Oct 16, 2025Updated 5 months ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Checkpoint 401 Forward Auth Security Server.☆17Jun 13, 2024Updated last year
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Check Safety of SSH Public Keys☆12Oct 8, 2022Updated 3 years ago
- misp-cloud - Cloud-ready images of MISP☆74Aug 24, 2022Updated 3 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A tool evaluates security configurations of a given PE based on SDL without source code☆16Jul 6, 2014Updated 11 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆176Jun 10, 2021Updated 4 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 9 years ago
- Python module to use the MISP Taxonomies☆31Apr 2, 2026Updated last week
- Elf checksec in Go.☆14May 10, 2022Updated 3 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago