About the MISP setup and automating event creation using PyMISP
-
Updated
Jul 13, 2019 - Python
About the MISP setup and automating event creation using PyMISP
Retrieves analysis information for a set of iocs (IP/Hash/URL/Domain) from VirusTotal API.
Import, Update, and Categorize malware samples from Malpedia (https://malpedia.caad.fkie.fraunhofer.de/) to a MISP (https://www.misp-project.org/) instance.
This script it's used to disable the attribute 'to_ids' on MISP events, features removal of the IDS tag on old events or based on Reputational datasets results.
(Unofficial) Script to convert and push Kaspersky APT IoC IP Data Feeds to MISP (Malware Information Sharing Platform)
(Unofficial) Script to convert and push Kaspersky APT IoC Hash Data Feeds to MISP (Malware Information Sharing Platform)
(Unofficial) Script to convert and push Kaspersky APT IoC URL Data Feeds to MISP (Malware Information Sharing Platform)
This project is a phishing classification ML system that can detect attacks through a hybrid URL and language models. It can also be connected to a MISP instance where it can take in new threats and classifying them automatically.
misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based on a set of customizable block rules.
Script to fetch data from virustotal and add it to a specific event as an object
PySight2MISP is a project that can be run to be used as glue between iSight intel API and MISP API
A curses-style interface for automatic takedown notification based on MISP events.
FireEye Alert json files to MISP Malware information sharing plattform (Alpha)
Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Add a description, image, and links to the misp-api topic page so that developers can more easily learn about it.
To associate your repository with the misp-api topic, visit your repo's landing page and select "manage topics."