The-Shadowserver-Foundation / api_utils
Sample programs to access the API
☆57Updated 2 months ago
Related projects: ⓘ
- ☆62Updated this week
- Fast IOC and YARA Scanner☆72Updated 4 years ago
- Docker image for MISP☆109Updated last week
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆121Updated 11 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆40Updated this week
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆82Updated this week
- ☆47Updated last week
- A collection of tips for using MISP.☆74Updated 5 months ago
- ☆43Updated 2 years ago
- Learn about a network from a pcap file or reading from an interface☆26Updated 5 months ago
- ☆34Updated 3 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆37Updated 2 years ago
- Convert Sigma rules to Wazuh rules☆55Updated 5 months ago
- A tool that allows you to document and assess any security automation in your SOC☆40Updated 4 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆91Updated 2 months ago
- Incident Response Network Tools☆22Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆66Updated 3 weeks ago
- Run zeek with zeekctl in docker☆46Updated last week
- Collection of useful Canary tools☆67Updated last week
- Corelight@Home script☆39Updated 11 months ago
- Run Velociraptor on Security Onion☆34Updated 2 years ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆58Updated 4 years ago
- RPM packages for MISP☆32Updated 2 weeks ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆47Updated last week
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆66Updated last year
- The FASTEST way to consume threat intel.☆62Updated last year
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated last month
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆48Updated 2 weeks ago
- An open source platform to support analysts to organise their case and tasks☆49Updated 2 weeks ago
- ☆17Updated 2 years ago