melicertes / csp
The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing confidence and trust among the national Computer Security Incident Response Teams (CSIRTs) of the Member States and for promoting swift and effective operational cooperation.
☆31Updated 3 years ago
Alternatives and similar repositories for csp:
Users that are interested in csp are comparing it to the libraries listed below
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆64Updated 4 months ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆85Updated 2 months ago
- Definition, description and relationship types of MISP objects☆94Updated this week
- Specifications used in the MISP project including MISP core format☆51Updated last month
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- An open source platform to support analysts to organise their case and tasks☆66Updated last week
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- An OpenTAXII Configuration for MISP☆81Updated 2 years ago
- ☆29Updated 4 years ago
- Automated handling of data feeds for security teams☆124Updated last month
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆57Updated last year
- Scripts for TheHive.☆22Updated 5 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated 2 weeks ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Updated 2 years ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆58Updated 4 years ago
- IntelMQ Manager is a graphical interface to manage configurations for IntelMQ framework.☆104Updated 7 months ago
- Threat Feed Aggregation, Made Easy☆167Updated 4 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆38Updated 2 years ago
- Incident Response Network Tools☆24Updated 3 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆30Updated last year
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆98Updated last month
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Seamless Threat Intelligence Platform☆47Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 4 months ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago