MISP2Sentinel
A Python integration that fetches Threat Intelligence from MISP and publishes it to Microsoft Sentinel SIEM. (by hazcod)
misp-warninglists
Warning lists to inform users of MISP about potential false-positives or other information in indicators (by MISP)
MISP2Sentinel | misp-warninglists | |
---|---|---|
2 | 3 | |
6 | 488 | |
- | 4.7% | |
4.4 | 8.3 | |
4 months ago | 7 days ago | |
Python | Python | |
Apache License 2.0 | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
MISP2Sentinel
Posts with mentions or reviews of MISP2Sentinel.
We have used some of these posts to build our list of alternatives
and similar projects.
-
I'm looking at improving our IOC Management section in CrowdStrike Falcon, but I have a simple question.
I wrote https://github.com/hazcod/MISP2Sentinel for this
- misp2sentinel: container to push MISP attributes to Microsoft Sentinel over the Graph API
misp-warninglists
Posts with mentions or reviews of misp-warninglists.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-05-07.
- Lists
-
Does anyone know what cdn4image.com is? I’ve searched but can’t find anything relevant to why it’s always showing up in my logs.
MSP Threat Intelligence list
-
Hashlookup-Forensic-Analyser
Indeed, specific files such as empty files but also many one or two bytes files are very recurring in many software sources. In the next version, we will include the MISP-warninglists such as the empty-hashes lists https://github.com/MISP/misp-warninglists/blob/main/lists/em... to warn about potential common files.
The tool can also work with the Bloom filter provided by hashlookup when the request to the API are not possible.
What are some alternatives?
When comparing MISP2Sentinel and misp-warninglists you can also consider the following projects:
MISP-QRadar-Integration - The Project can be used to integrate QRadar with MISP Threat Sharing Platform
misp-galaxy - Clusters and elements to attach to MISP events or attributes (like threat actors)
ThreatIngestor - Extract and aggregate threat intelligence.
Watcher - Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
hashlookup-forensic-analyser - Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
ThePhish - ThePhish: an automated phishing email analysis tool