s-tip / stip-common
Seamless Threat Intelligence Platform
☆47Updated last year
Alternatives and similar repositories for stip-common:
Users that are interested in stip-common are comparing it to the libraries listed below
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆107Updated 4 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 7 months ago
- Sigma Detection Rule Repository☆86Updated 4 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆105Updated last year
- Converts Sigma detection rules to a Splunk alert configuration.☆108Updated 4 years ago
- A CALDERA plugin☆74Updated 2 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆53Updated 3 weeks ago
- ☆116Updated last year
- Log Entry to Sigma Rule Converter☆107Updated 2 years ago
- A Splunk app to use MISP in background☆109Updated 3 months ago
- A website and framework for testing NIDS detection☆56Updated 3 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated 11 months ago
- An OpenTAXII Configuration for MISP☆80Updated 2 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆78Updated 2 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- A utility repo to assist with converting between MISP and STIX formats☆64Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- Scripts for TheHive.☆22Updated 5 years ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆195Updated last year
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆85Updated last month
- Collecting & Hunting for IOCs with gusto and style☆236Updated 3 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- ☆118Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆51Updated last month
- Definition, description and relationship types of MISP objects☆94Updated last week