MISP2Sentinel
A Python integration that fetches Threat Intelligence from MISP and publishes it to Microsoft Sentinel SIEM. (by hazcod)
misp-galaxy
Clusters and elements to attach to MISP events or attributes (like threat actors) (by MISP)
MISP2Sentinel | misp-galaxy | |
---|---|---|
2 | 3 | |
6 | 481 | |
- | 1.2% | |
4.4 | 9.8 | |
3 months ago | 8 days ago | |
Python | Python | |
Apache License 2.0 | GNU General Public License v3.0 or later |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
MISP2Sentinel
Posts with mentions or reviews of MISP2Sentinel.
We have used some of these posts to build our list of alternatives
and similar projects.
-
I'm looking at improving our IOC Management section in CrowdStrike Falcon, but I have a simple question.
I wrote https://github.com/hazcod/MISP2Sentinel for this
- misp2sentinel: container to push MISP attributes to Microsoft Sentinel over the Graph API
misp-galaxy
Posts with mentions or reviews of misp-galaxy.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-04-26.
-
Foreign Travel Risks
MISP Threat Actor Galaxy
-
Profiling and Tracking Threat Actors
MISP threat actors galaxy may be of interest: https://github.com/MISP/misp-galaxy
-
Learning about apt groups
https://attack.mitre.org/groups/ this is a solid source. If you want to see the MISP list of threat actors from their service you can look here https://github.com/MISP/misp-galaxy/blob/main/clusters/threat-actor.json . The painful thing about this topic is every security vendor has a different naming convention for the threat actors in question.
What are some alternatives?
When comparing MISP2Sentinel and misp-galaxy you can also consider the following projects:
MISP-QRadar-Integration - The Project can be used to integrate QRadar with MISP Threat Sharing Platform
ThePhish - ThePhish: an automated phishing email analysis tool
Watcher - Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
threatbus - 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.
MISP - MISP (core software) - Open Source Threat Intelligence and Sharing Platform
misp-warninglists - Warning lists to inform users of MISP about potential false-positives or other information in indicators
OTX-Suricata - The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX account.