Docker container for MISP
☆96Jun 20, 2018Updated 7 years ago
Alternatives and similar repositories for misp-docker
Users that are interested in misp-docker are comparing it to the libraries listed below
Sorting:
- Threat Feed Aggregation, Made Easy☆169Jul 13, 2020Updated 5 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆176Mar 23, 2021Updated 4 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- Docker based Suricata, Elasticsearch, Logstash, Kibana, Scirius aka SELKS☆184Sep 13, 2022Updated 3 years ago
- MISP Docker (XME edition)☆282Dec 5, 2023Updated 2 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- Modules for expansion services, enrichment, import and export in MISP and other tools.☆362Updated this week
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Network Forensics Bro scripts & pcap samples☆63Mar 11, 2014Updated 11 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- brocon-15 scripts☆13Apr 3, 2017Updated 8 years ago
- misp-cloud - Cloud-ready images of MISP☆74Aug 24, 2022Updated 3 years ago
- Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.☆295Updated this week
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- ☆29Feb 25, 2017Updated 9 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- Web App for Volatility framework☆390Jan 13, 2026Updated last month
- Automater - IP URL and MD5 OSINT Analysis☆552Aug 13, 2024Updated last year
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,113Feb 14, 2026Updated 2 weeks ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago