MISP Workbench Tools Logo

MISP Workbench Tools

0
Free
Visit Website

Tools to export data out of the MISP MySQL database and use and abuse them outside of this platform. The initial idea behind this code is to help analysts working on cases after the incident happened and searching for correlation between multiple events. Have a look at each directory and read the documentation for more details: - Export data MySQL into Redis - Fast lookup against MISP data using the hashstore database - Query and interact with groups created from MISP data

FEATURES

ALTERNATIVES

A threat hunting tool for Windows event logs to detect APT movements and decrease the time to uncover suspicious activity.

Curated datasets for developing and testing detections in SIEM installations.

Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.

A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.

Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.

A repository of freely usable Yara rules for detection systems, with automated error detection workflows.

A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.

Vectra AI offers an AI-driven Attack Signal Intelligence platform that uses advanced machine learning to detect and respond to cyber threats across hybrid cloud environments.

PINNED