FireEye Alert json files to MISP Malware information sharing plattform (Alpha)
-
Updated
Jun 11, 2017 - Python
FireEye Alert json files to MISP Malware information sharing plattform (Alpha)
About the MISP setup and automating event creation using PyMISP
Script to fetch data from virustotal and add it to a specific event as an object
(Unofficial) Script to convert and push Kaspersky APT IoC IP Data Feeds to MISP (Malware Information Sharing Platform)
(Unofficial) Script to convert and push Kaspersky APT IoC Hash Data Feeds to MISP (Malware Information Sharing Platform)
(Unofficial) Script to convert and push Kaspersky APT IoC URL Data Feeds to MISP (Malware Information Sharing Platform)
A curses-style interface for automatic takedown notification based on MISP events.
PySight2MISP is a project that can be run to be used as glue between iSight intel API and MISP API
Import, Update, and Categorize malware samples from Malpedia (https://malpedia.caad.fkie.fraunhofer.de/) to a MISP (https://www.misp-project.org/) instance.
This script it's used to disable the attribute 'to_ids' on MISP events, features removal of the IDS tag on old events or based on Reputational datasets results.
This project is a phishing classification ML system that can detect attacks through a hybrid URL and language models. It can also be connected to a MISP instance where it can take in new threats and classifying them automatically.
Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based on a set of customizable block rules.
Retrieves analysis information for a set of iocs (IP/Hash/URL/Domain) from VirusTotal API.
Add a description, image, and links to the misp-api topic page so that developers can more easily learn about it.
To associate your repository with the misp-api topic, visit your repo's landing page and select "manage topics."