MISP Taxii Server Logo

MISP Taxii Server

0
Free
Visit Website

A set of configuration files to use with EclecticIQ's OpenTAXII implementation, along with a callback for when data is sent to the TAXII Server's inbox. Installation: Manual install git clone https://github.com/MISP/MISP-Taxii-Server cd MISP-Taxii-Server apt-get install libmysqlclient-dev # for mysql_config pip3 install -r REQUIREMENTS.txt You'll then need to set up your TAXII database. As you're using MISP, you'll likely already have a MySQL environment running. mysql -u [database user] -p # Enter Database password mysql> create database taxiiauth; mysql> create database taxiipersist; mysql> grant all on taxiiauth.* to 'taxii'@'%' identified by 'some_password'; mysql> grant all on taxiipersist.* to 'taxii'@'%' identified by 'some_password'; mysql> exit; Now configure your TAXII server cp config/config.default.yaml config/config.yaml Now, with that data, copy config/config.default.yaml over to config/config.yaml and open it. Edit the db_connection parameters to match your environment. Change auth_api -> parameters -> secret whilst you're here as well. Do not forget to set your MISP server's URL and API key at the bottom. If you wish, you can edit the taxii service

FEATURES

ALTERNATIVES

Vectra AI offers an AI-driven Attack Signal Intelligence platform that uses advanced machine learning to detect and respond to cyber threats across hybrid cloud environments.

The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.

A sophisticated npm attack attributed to North Korean threat actors, targeting technology firms and their employees.

Maltiverse automates Threat Intelligence for small and medium-sized SecOps teams, providing an effective and affordable service.

A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.

RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.

A command-line tool that fetches known URLs from various sources to identify potential security threats and vulnerabilities.

A Pythonic framework for automated threat modeling shifting left.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved