MISP Taxii Server Logo

MISP Taxii Server

0
Free
Visit Website

A set of configuration files to use with EclecticIQ's OpenTAXII implementation, along with a callback for when data is sent to the TAXII Server's inbox. Installation: Manual install git clone https://github.com/MISP/MISP-Taxii-Server cd MISP-Taxii-Server apt-get install libmysqlclient-dev # for mysql_config pip3 install -r REQUIREMENTS.txt You'll then need to set up your TAXII database. As you're using MISP, you'll likely already have a MySQL environment running. mysql -u [database user] -p # Enter Database password mysql> create database taxiiauth; mysql> create database taxiipersist; mysql> grant all on taxiiauth.* to 'taxii'@'%' identified by 'some_password'; mysql> grant all on taxiipersist.* to 'taxii'@'%' identified by 'some_password'; mysql> exit; Now configure your TAXII server cp config/config.default.yaml config/config.yaml Now, with that data, copy config/config.default.yaml over to config/config.yaml and open it. Edit the db_connection parameters to match your environment. Change auth_api -> parameters -> secret whilst you're here as well. Do not forget to set your MISP server's URL and API key at the bottom. If you wish, you can edit the taxii service

FEATURES

ALTERNATIVES

A collection of Yara rules licensed under the DRL 1.1 License.

Maltiverse automates Threat Intelligence for small and medium-sized SecOps teams, providing an effective and affordable service.

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.

A free and open-source OSINT framework for gathering and analyzing data from various sources

A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.

A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.

Bearded Avenger is a cybersecurity tool with various integrations and deployment instructions available.

Repository for detection content with various types of rules and payloads.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved