adulau / misp-osint-collectionLinks
Collection of best practices to add OSINT into MISP and/or MISP communities
☆66Updated last year
Alternatives and similar repositories for misp-osint-collection
Users that are interested in misp-osint-collection are comparing it to the libraries listed below
Sorting:
- For storing of the volumes☆4Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆57Updated this week
- A toolkit for Security Researchers☆127Updated 5 years ago
- ForGe Forensic test image generator☆34Updated 10 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆65Updated 7 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Updated 4 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- ☆51Updated 6 years ago
- automate your MISP installs☆68Updated 4 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- open-source intelligence gathering for SIEMs <3☆38Updated 8 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- A script to track malware IOCs with OSINT on Twitter.☆53Updated last year
- InvestigationPlaybookSpec☆72Updated 7 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 8 months ago
- Maltego transforms for the ThreatCrowd search API☆49Updated 7 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- A collection of typical false positive indicators☆55Updated 4 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago