MISP (core software) - Open Source Threat Intelligence and Sharing Platform (formely known as Malware Information Sharing Platform)
-
Updated
Sep 17, 2020 - PHP
{{ message }}
MISP (core software) - Open Source Threat Intelligence and Sharing Platform (formely known as Malware Information Sharing Platform)
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Sysmon configuration file template with default high-quality event tracing
The Hunting ELK
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
A curated list of awesome threat detection and hunting resources
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
A curated list of awesome YARA rules, tools, and people.
Signature base for my scanner tools
Your Everyday Threat Intelligence
Windows Events Attack Samples
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Utilities for Sysmon
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
A Linux Auditd rule set mapped to MITRE's Attack Framework
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
An Active Defense and EDR software to empower Blue Teams
Advanced Sysmon configuration, Installer & Auto Updater with high-quality event tracing
FCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Extract and aggregate threat intelligence.
I think that you are doing a very necessary system and your idea is cool, but at the moment it has a lot of bugs. From what I noticed, the assets do not understand the ascii characters and the system crashes. In addition, I did not find a description of the API, I would like to integrate your system into TheHive, or rather make it possible to view information about an asset in TheHive. I believe t
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Clusters and elements to attach to MISP events or attributes (like threat actors)
A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Add a description, image, and links to the threat-hunting topic page so that developers can more easily learn about it.
To associate your repository with the threat-hunting topic, visit your repo's landing page and select "manage topics."
I was wondering the benefit of using Modular File Management vs Single Config File Management? Why do you consider it easier to use multiple files and then compile? Trying to figure out what the best case is for my use case. Thanks. #