msticpy Logo

msticpy

0
Free
Visit Website

msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks. It includes functionality to: - Query log data from multiple sources - Enrich the data with Threat Intelligence, geolocations and Azure resource data - Extract Indicators of Activity (IoA) from logs and unpack encoded data - Perform sophisticated analysis such as anomalous session detection and time series decomposition - Visualize data using interactive timelines, process trees and multi-dimensional Morph Charts - Includes time-saving notebook tools such as widgets to set query time boundaries, select and display items from lists, and configure the notebook environment. - Initially developed to support Jupyter Notebooks authoring for Azure Sentinel, now extended to pull log data from other sources.

FEATURES

ALTERNATIVES

Freely available network IOCs for monitoring and incident response

A library of adversary emulation plans to evaluate defensive capabilities against real-world threats.

A tool for creating custom detection rules from YAML input

BotScout.com provides proactive bot detection, screening, and banning through a powerful API.

Forager is a threat intelligence tool that simplifies the retrieval, storage, and maintenance of threat data with a user-friendly interface and support for various data sources.

A community-driven list of sample security analytics for auditing cloud usage and detecting threats in Google Cloud.

A repository of freely usable Yara rules for detection systems, with automated error detection workflows.

Pulsedive is a threat intelligence platform that provides frictionless threat intelligence for growing teams, offering features such as indicator enrichment, threat research, and API integration.

PINNED