A script to create every available object in ThreatConnect.
-
Updated
Jul 24, 2017 - Python
A script to create every available object in ThreatConnect.
an awesome list of honeypot resources
DFIR IoC Unit Testing
python implementation of the indicator-protocol
Analyst tools to speed up interacting with the Blockade cloud node
Python-based cloud node for local use
Script to interface MISP with Facebook ThreatExchange
Python bindings for Yeti's API
A curses-style interface for automatic takedown notification based on MISP events.
The Fastest way to consume Threat Intel
the fastest way to consume threat intelligence.
Malicious IP source.
The Project can be used to integrate QRadar with MISP Threat Sharing Platform
Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
A utility repo to assist with converting between MISP and STIX formats
TAXII client implementation from EclecticIQ
Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security related information) from text. It uses grammars rather than regexes which makes it more readable, maintainable, and hackable. Explore our interactive documentation here: https://hightower.space/ioc-finder/
CIF v3 -- the fastest way to consume threat intelligence
TAXII server implementation in Python from EclecticIQ
Add a description, image, and links to the threat-sharing topic page so that developers can more easily learn about it.
To associate your repository with the threat-sharing topic, visit your repo's landing page and select "manage topics."