telekom-security / ewsposter
collect logs and alerts from 27 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.
☆16Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ewsposter
- Watchtower, monitoring your Slack workspaces.☆16Updated 3 years ago
- ☆23Updated this week
- D4 core software (server and sample sensor client)☆43Updated 10 months ago
- 🤖 Daily updated translation maps for T-Pot☆22Updated 6 months ago
- Build Automated Machine Images for MISP☆28Updated last year
- Setting up a training environment for MISP☆11Updated last year
- CyCAT.org taxonomies☆14Updated 3 years ago
- A Spicy protocol analyzer for WireGuard☆28Updated 4 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆83Updated 5 years ago
- Python bindings for Yeti's API☆18Updated last year
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- ☆33Updated 3 years ago
- Useful commands for infosec☆28Updated last year
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Providing timelines based on OSINT Reports☆32Updated last year
- Passive DNS server interface compliant to "Common Output Format"☆10Updated 8 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- Specifications used in the MISP project including MISP core format☆46Updated 3 weeks ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆31Updated 2 weeks ago
- Maltego transforms for the ThreatCrowd search API☆46Updated 6 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 11 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆17Updated 4 years ago
- ☆15Updated 6 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20Updated 7 years ago