mohlcyber / OpenDXL-ATD-MISPLinks
Automated threat intelligence collection with McAfee ATD, OpenDXL and MISP
☆22Updated 5 years ago
Alternatives and similar repositories for OpenDXL-ATD-MISP
Users that are interested in OpenDXL-ATD-MISP are comparing it to the libraries listed below
Sorting:
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- Automated OpenDXL Output information via IntelMQ☆14Updated 8 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 8 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Python IOC Editor☆63Updated 10 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 4 years ago
- Web based Manager for Yara Rules☆58Updated 5 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- A utility repo to assist with converting between MISP and STIX formats☆69Updated 4 years ago
- My Yara Rules Collection☆53Updated 9 years ago
- ☆37Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated last year
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 9 years ago
- An OpenTAXII Configuration for MISP☆83Updated 2 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated 8 months ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- ☆55Updated 3 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Updated last year
- Cyber Intel Management☆49Updated 7 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20Updated 3 years ago
- Carbon Black Feeds☆73Updated 2 years ago
- Splunk Boss of the SOC v1 data set.☆111Updated 7 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆50Updated 7 years ago
- Auxiliary scripts for Incident Response with ELK☆11Updated 9 years ago