MISP
MISP (core software) - Open Source Threat Intelligence and Sharing Platform (by MISP)
Cake-Resque
Resque plugin for CakePHP : for creating background jobs that can be processed offline later (by wa0x6e)
MISP | Cake-Resque | |
---|---|---|
28 | 1 | |
4,998 | 159 | |
1.3% | - | |
9.9 | 10.0 | |
1 day ago | almost 2 years ago | |
PHP | PHP | |
GNU Affero General Public License v3.0 | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
MISP
Posts with mentions or reviews of MISP.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-08-16.
- A recent abrupt change in Internet SSH brute force attacks against us
-
Free Tech Tools and Resources - Terraform for AWS, Cyberthreat Tool, Vim Training & More
MISP is an open-source solution to streamline the acquisition, retention, distribution, and collaborative exchange of critical cybersecurity indicators and threats. Timely-Lychee-5204 considers it "a threat intelligence platform for gathering, sharing, storing, and correlating indicators of compromise."
-
Top OpenSource/Free Cybersecurity Tools
MISP https://www.misp-project.org/
-
Creating a cyber threat intelligence tool
It sounds like you want to jump into game development before learning how to write "Hello, world!". Try using any of the open source tools that already do this and sign up for some "free" threat intel tools and learn the lay of the land. https://www.misp-project.org/ https://github.com/OpenCTI-Platform/opencti https://iplists.firehol.org/ https://www.greynoise.io/
- Threat intelligence IOC enrichments?
-
MISP at scale on Kubernetes
Yes but … the frontend/ui is still trying to check the health of each process by checking in /proc/{PID} like in previous and shows that the process maybe start but it couldn’t check if it’s alive or not. An issue was created and we’re waiting for the patch to be integrated in a future version.
- Have you ever tried to create your own module by following the guide in the github repo "misp-modules"?
-
Threat Intel with MITRE ATT&CK - how to document progress
You could use MISP to collect events and IOCs about threat actors and map their activity using Mitre ATTAC&K. Once you start building a knowledge base you can mainly focus on Threat actors who are interested in your sector.
-
Get CrowdSec IOCs feed into MISP
Is it possible to feed MISP with CrowdSec’s IOC lists?
-
How large are all feeds combined?
Also forgot to include this, for the blog post - yeah it should go up there soon. Until then it's to be found here: https://github.com/MISP/MISP/releases/tag/v2.4.160
Cake-Resque
Posts with mentions or reviews of Cake-Resque.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-11-17.
-
MISP at scale on Kubernetes
Up to version 2.4.150, the MISP background jobs (workers) were managed by CakeResque library. When starting a worker, the MISP is writing its PID into Redis. Based on that PID, the frontend shows worker’s health by checking if the /proc/{PID} exists. When running multiple replicas, the last started pod writes its PIDs to Redis and may not be the same as the others. Refreshing the frontend on the browser may show an unavailable worker due to inconsistent PID numbers (for example, latest PID of process prio registered is 33 and the container serving the user’s request know process prio by its PID 55).
What are some alternatives?
When comparing MISP and Cake-Resque you can also consider the following projects:
opencti - Open Cyber Threat Intelligence Platform
misp-docker - A production ready Dockered MISP
crits - CRITs - Collaborative Research Into Threats
misp-cloud - misp-cloud - Cloud-ready images of MISP
intelmq - IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
docker-misp - A (nearly) production ready Dockered MISP
SplunkDashboards - Collection of Dashboards for Threat Hunting and more!
misp-container-worker
elasticsearch-mapper-attachments - Mapper Attachments Type plugin for Elasticsearch
supervisor - Supervisor process control system for Unix (supervisord)
cowrie - Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
misp-helm-chart
MISP vs opencti
Cake-Resque vs misp-docker
MISP vs crits
Cake-Resque vs misp-cloud
MISP vs intelmq
Cake-Resque vs docker-misp
MISP vs SplunkDashboards
Cake-Resque vs misp-container-worker
MISP vs elasticsearch-mapper-attachments
Cake-Resque vs supervisor
MISP vs cowrie
Cake-Resque vs misp-helm-chart