Tools to export data out of the MISP MySQL database and use and abuse them outside of this platform. The initial idea behind this code is to help analysts working on cases after the incident happened and searching for correlation between multiple events. Have a look at each directory and read the documentation for more details: - Export data MySQL into Redis - Fast lookup against MISP data using the hashstore database - Query and interact with groups created from MISP data
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.
Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.
Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.
A tool to extract indicators of compromise from security reports in PDF format.
Automatically create yara rules based on images embedded in office documents.
Robust Python SDK and Command Line Client for interacting with IntelOwl's API.
Scan files with Yara, match findings to VirusTotal comments.
QRadio is a tool/framework designed to consolidate cyber threats intelligence sources.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.