Tools to export data out of the MISP MySQL database and use and abuse them outside of this platform. The initial idea behind this code is to help analysts working on cases after the incident happened and searching for correlation between multiple events. Have a look at each directory and read the documentation for more details: - Export data MySQL into Redis - Fast lookup against MISP data using the hashstore database - Query and interact with groups created from MISP data

FEATURES

This tool is not verified yet and doesn't have listed features.

Did you submit the verified tool? Sign in to add features.

Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.

ALTERNATIVES

Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.

A collection of public YARA signatures for various malware families.

AbuseHelper is an open-source framework for receiving and redistributing abuse feeds and threat intel.

Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.

ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring.

Stay informed with Rapid7's cybersecurity blog and vulnerability news updates.