onyphe / pyonyphe
☆15Updated 2 years ago
Related projects: ⓘ
- ☆24Updated last year
- A collection of typical false positive indicators☆54Updated 3 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Converting data from services like Censys and Shodan to a common data model☆48Updated last week
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆67Updated 10 months ago
- ☆28Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated last year
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 3 years ago
- ☆17Updated 5 years ago
- ☆40Updated this week
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Home to the ActorTrackr source code☆27Updated 7 years ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆14Updated 3 months ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- SightingDB is a database for Sightings☆21Updated last year
- An open source platform to support analysts to organise their case and tasks☆49Updated 2 weeks ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Updated 3 years ago
- Providing timelines based on OSINT Reports☆32Updated last year
- Site for IWS book content☆18Updated 5 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- ☆50Updated 6 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 3 years ago
- Bot to create MISP events from data in Slack☆17Updated 8 months ago
- Splunk integration with MISP☆12Updated 6 years ago