eCrimeLabs / cratos-fastapi
The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such as SIEM, DNS, Proxies, Firewalls, EDR, NDR and other that can consume a file with indicators.
☆13Updated last month
Related projects ⓘ
Alternatives and complementary repositories for cratos-fastapi
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- ☆24Updated 2 years ago
- A web scraper to create MISP events and reports☆14Updated last year
- CyCAT.org API back-end server including crawlers☆30Updated last year
- ☆14Updated 6 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆31Updated this week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆14Updated this week
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Updated 2 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated 10 months ago
- command line tool to use the DNSDB Flexible Search API extensions.☆15Updated 3 months ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Updated 2 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 2 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Updated 7 months ago
- certstream + analytics☆10Updated 4 years ago
- Notes for High Availability MISP in AWS☆19Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated last year
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated last year
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- Zeek package to generate a SMB client fingerprint☆26Updated 4 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated 11 months ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆16Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated last month
- External twitter feeder for AIL framework☆15Updated last year