coolacid / misp_feedgenLinks
Feed Generator for MISP
☆19Updated 3 years ago
Alternatives and similar repositories for misp_feedgen
Users that are interested in misp_feedgen are comparing it to the libraries listed below
Sorting:
- A Splunk app to use MISP in background☆113Updated last month
- Pulls IOCs from MISP and adds the to reference sets in QRadar☆34Updated 2 years ago
- Carbon Black Feeds☆73Updated 2 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 10 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆75Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Updated 5 years ago
- Sigma Detection Rule Repository☆91Updated 5 years ago
- Powershell Functions to interact with TheHive-Project☆11Updated 6 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Updated 2 years ago
- Scripts for TheHive.☆23Updated 6 years ago
- A utility repo to assist with converting between MISP and STIX formats☆69Updated 4 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 5 years ago
- Volatility plugins developed and maintained by the community☆21Updated last year
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 4 years ago
- Miscelaneous Dockers☆47Updated 4 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- An OpenTAXII Configuration for MISP☆87Updated 3 years ago
- Dump of organized knowledge on DFIR☆135Updated 4 years ago
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40Updated 3 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Updated last month
- Converts Sigma detection rules to a Splunk alert configuration.☆114Updated 5 years ago
- Definition, description and relationship types of MISP objects☆104Updated this week
- Log Entry to Sigma Rule Converter☆108Updated 3 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 3 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆84Updated 5 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- Security Monitoring Resolution Categories☆138Updated 4 years ago