☆35May 4, 2026Updated this week
Alternatives and similar repositories for misp-warning-lists
Users that are interested in misp-warning-lists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Watchtower, monitoring your Slack workspaces.☆16Jan 26, 2021Updated 5 years ago
- collect logs and alerts from 37 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆17Aug 15, 2025Updated 8 months ago
- 🤖 Daily updated translation maps for T-Pot☆22Apr 25, 2024Updated 2 years ago
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated 3 months ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Apr 18, 2026Updated 2 weeks ago
- Cobalt Strike Aggressor Script Collection☆19Mar 30, 2018Updated 8 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- Parses the FireEye HX .mans triage collections and sends them to ElasticSearch☆17Feb 17, 2023Updated 3 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 7 months ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- ☆10Jul 18, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆14Feb 8, 2020Updated 6 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- BigPhish - An all-in-one solution to identify and monitor phishing kit deployment☆14Dec 31, 2025Updated 4 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆12Oct 29, 2020Updated 5 years ago
- ☆24Jul 28, 2020Updated 5 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆39Jun 29, 2024Updated last year
- SQL, IIS, Oh My...☆22Feb 24, 2025Updated last year
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Security scanning tool that integrates with Veeam Backup & Replication to perform vulnerability assessments on backup data without needin…☆12Apr 6, 2026Updated 3 weeks ago
- Simple SYSLOG client in Go☆23Jun 5, 2025Updated 11 months ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- JSON-based DSLs are not for humans..☆10Sep 4, 2014Updated 11 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- ☆15Nov 29, 2017Updated 8 years ago
- ☆24Apr 22, 2025Updated last year
- Docker images of PowerDNS software built on Alpine Linux☆20Apr 25, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- RELK -- The Research Elastic Stack (Kafka, Beats, Zookeeper, Logstash, ElasticSearch, Kibana, Spark, & Jupyter -- All in Docker)☆28Nov 7, 2019Updated 6 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key - Fully Undetectable (FUD)☆18May 18, 2020Updated 5 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Feb 18, 2026Updated 2 months ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago