cudeso / misp-scraperLinks
A web scraper to create MISP events and reports
☆16Updated last week
Alternatives and similar repositories for misp-scraper
Users that are interested in misp-scraper are comparing it to the libraries listed below
Sorting:
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated this week
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated last month
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- ☆21Updated 3 months ago
- Can you pay the ransom in your country?☆14Updated last year
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆14Updated last week
- The core backend server handling API requests and task management☆42Updated this week
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆17Updated last year
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated last year
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 3 years ago
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆21Updated 8 months ago
- Sandbox samples and monitor them with kunai☆23Updated this week
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated 2 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Cyber Threats Detection Rules☆14Updated last month
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- Tools and scripts to deploy and manage OpenRelik instances☆14Updated last week
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆20Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 months ago
- Summarize CTI reports with OpenAI☆16Updated this week
- Open-source Fabric templates for cybersecurity and compliance☆20Updated 5 months ago
- Scripts and lists to help generate YARA friendly string mutations☆21Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 4 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆79Updated last month
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- ☆11Updated 2 years ago
- ☆15Updated 2 months ago