Definition, description and relationship types of MISP objects
-
Updated
Jun 10, 2024 - Python
Definition, description and relationship types of MISP objects
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS
OpenCTI Connectors
Security lists for SOC detections
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other security tools.
Python library using the MISP Rest API
MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats
Modules for expansion services, enrichment, import and export in MISP and other tools.
Clusters and elements to attach to MISP events or attributes (like threat actors)
Warning lists to inform users of MISP about potential false-positives or other information in indicators
This module installs and configures MISP (Malware Information Sharing Platform)
Import CrowdStrike Threat Intelligence into your instance of MISP
Domain white list applied to https://github.com/davidonzo/Threat-Intel
Website for ail-typo-squatting library
Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.
This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash.
VirusTotal Query to MISP Objects
Add a description, image, and links to the misp topic page so that developers can more easily learn about it.
To associate your repository with the misp topic, visit your repo's landing page and select "manage topics."