MISP Workbench Tools Logo

MISP Workbench Tools

0
Free
Updated 11 March 2025
Visit Website

Tools to export data out of the MISP MySQL database and use and abuse them outside of this platform. The initial idea behind this code is to help analysts working on cases after the incident happened and searching for correlation between multiple events. Have a look at each directory and read the documentation for more details: - Export data MySQL into Redis - Fast lookup against MISP data using the hashstore database - Query and interact with groups created from MISP data

FEATURES

SIMILAR TOOLS

Provides indicators of compromise (IOCs) to combat malware with Yara and Snort rules.

Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.

Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.

A tool to extract indicators of compromise from security reports in PDF format.

Automatically create yara rules based on images embedded in office documents.

Tool for managing Yara rules on VirusTotal

Robust Python SDK and Command Line Client for interacting with IntelOwl's API.

Scan files with Yara, match findings to VirusTotal comments.

QRadio is a tool/framework designed to consolidate cyber threats intelligence sources.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved