sebdraven / IOCmiteLinks
Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert
☆36Updated 2 years ago
Alternatives and similar repositories for IOCmite
Users that are interested in IOCmite are comparing it to the libraries listed below
Sorting:
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆89Updated last month
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 3 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated last week
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- An open source platform to support analysts to organise their case and tasks☆94Updated last week
- A collection of tips for using MISP.☆74Updated 7 months ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Updated 4 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Updated last year
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that ma…☆16Updated 2 years ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆67Updated 3 months ago
- ☆38Updated 9 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆59Updated 2 months ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆78Updated last month
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago
- A script to create and assign SOP tasks into the cases☆20Updated 4 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20Updated 3 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆33Updated this week
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Updated 2 years ago
- ☆36Updated 4 years ago
- ☆15Updated 3 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated 4 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 3 weeks ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Updated 11 months ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Updated 3 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated 2 years ago
- Web Application for domain name monitoring / alerting☆64Updated last year