msticpy Logo

msticpy

0
Free
Visit Website

msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks. It includes functionality to: - Query log data from multiple sources - Enrich the data with Threat Intelligence, geolocations and Azure resource data - Extract Indicators of Activity (IoA) from logs and unpack encoded data - Perform sophisticated analysis such as anomalous session detection and time series decomposition - Visualize data using interactive timelines, process trees and multi-dimensional Morph Charts - Includes time-saving notebook tools such as widgets to set query time boundaries, select and display items from lists, and configure the notebook environment. - Initially developed to support Jupyter Notebooks authoring for Azure Sentinel, now extended to pull log data from other sources.

FEATURES

ALTERNATIVES

A Python library for handling TAXII v1.x Messages and invoking TAXII Services.

A cybersecurity tool with online demo, mailing list, and multiple installation methods.

Repository of YARA rules for identifying and classifying malware.

OpenPhish provides real-time phishing trends, detecting new phishing URLs and targeting various brands.

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

Real-time, container-based file scanning system for threat hunting and incident response.

Sample detection rules and dashboards for Google Security Operations

API for querying domain security information, categorization, and related data.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved