All Projects → MISP → best-practices-in-threat-intelligence

MISP / best-practices-in-threat-intelligence

Licence: other
Best practices in threat intelligence

Programming Languages

HTML
75241 projects
shell
77523 projects

Projects that are alternatives of or similar to best-practices-in-threat-intelligence

Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+9071.05%)
Mutual labels:  misp, threat-sharing, threatintel, information-sharing, threat-intelligence
misp-takedown
A curses-style interface for automatic takedown notification based on MISP events.
Stars: ✭ 19 (-50%)
Mutual labels:  misp, threat-sharing, information-sharing, threat-intelligence
mail to misp
Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Stars: ✭ 61 (+60.53%)
Mutual labels:  misp, threatintel, threat-intelligence
ThreatIntelligence
Tracking APT IOCs
Stars: ✭ 23 (-39.47%)
Mutual labels:  threat-sharing, threatintel, threat-intelligence
misp-osint-collection
Collection of best practices to add OSINT into MISP and/or MISP communities
Stars: ✭ 54 (+42.11%)
Mutual labels:  misp, threat-sharing, threat-intelligence
awesome-malware-analysis
Defund the Police.
Stars: ✭ 9,181 (+24060.53%)
Mutual labels:  threat-sharing, threatintel, threat-intelligence
docker-misp
A (nearly) production ready Dockered MISP
Stars: ✭ 184 (+384.21%)
Mutual labels:  misp, threat-sharing, threat-intelligence
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-42.11%)
Mutual labels:  misp, threatintel, threat-intelligence
pyeti
Python bindings for Yeti's API
Stars: ✭ 15 (-60.53%)
Mutual labels:  threat-sharing, threatintel
misp-objects
Definition, description and relationship types of MISP objects
Stars: ✭ 73 (+92.11%)
Mutual labels:  misp, information-sharing
csirtg-smrt-v1
the fastest way to consume threat intelligence.
Stars: ✭ 27 (-28.95%)
Mutual labels:  threat-sharing, threatintel
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+1678.95%)
Mutual labels:  misp, threat-intelligence
ioc-fanger
Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Stars: ✭ 47 (+23.68%)
Mutual labels:  threat-sharing, threatintel
Public-Intelligence-Feeds
Standard-Format Threat Intelligence Feeds
Stars: ✭ 60 (+57.89%)
Mutual labels:  threatintel, threat-intelligence
intelligence-icons
intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
Stars: ✭ 32 (-15.79%)
Mutual labels:  misp, threat-intelligence
sqhunter
A simple threat hunting tool based on osquery, Salt Open and Cymon API
Stars: ✭ 64 (+68.42%)
Mutual labels:  threatintel, threat-intelligence
cycat-service
CyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-34.21%)
Mutual labels:  misp, threat-intelligence
SyntheticSun
SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats.
Stars: ✭ 49 (+28.95%)
Mutual labels:  misp, threat-intelligence
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+107.89%)
Mutual labels:  threatintel, threat-intelligence
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-23.68%)
Mutual labels:  threatintel, threat-intelligence

Best Practices in Threat Intelligence

The aim of this book is to compile the best practices in threat intelligence analysis. Whilst it can be used as a general guide, it is based on the open source threat intelligence platform called MISP, for practical reasons.

The book is available in PDF and HTML format.

How To Contribute

  1. Fork the project
  2. Add your best practice in the directory best-practices in asciidoctor format and don't forget to include the file in book.adoc
  3. Make a pull-request

License

The book is licensed under the AGPL version 3.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].