☆33Mar 4, 2026Updated this week
Alternatives and similar repositories for misp-warning-lists
Users that are interested in misp-warning-lists are comparing it to the libraries listed below
Sorting:
- Watchtower, monitoring your Slack workspaces.☆16Jan 26, 2021Updated 5 years ago
- collect logs and alerts from 37 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆15Aug 15, 2025Updated 6 months ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- 🤖 Daily updated translation maps for T-Pot☆22Apr 25, 2024Updated last year
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Dec 13, 2023Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Parses the FireEye HX .mans triage collections and sends them to ElasticSearch☆17Feb 17, 2023Updated 3 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆38Jun 29, 2024Updated last year
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Dockerized eMobility for use in T-Pot☆18Oct 23, 2017Updated 8 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated last month
- Client-side scripts provided by WhoisXML API, Inc., for clients using WHOIS data feeds to obtain bulk whois data or to set up a WHOIS da…☆19Jun 7, 2023Updated 2 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- APT & CyberCriminal Campaign Collection☆15Sep 30, 2018Updated 7 years ago
- Putting the Sauce in CyberChef - making CyberChef automatable☆19Feb 18, 2026Updated 2 weeks ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 5 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Feb 13, 2026Updated 3 weeks ago
- ☆35Jun 22, 2021Updated 4 years ago
- Collection of various open-source an commercial rulesets for NIDS (especially for Suricata and Snort)☆29Jul 24, 2023Updated 2 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Jan 1, 2023Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆25Jul 21, 2022Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…