blocklist-ipsets
MISP
Our great sponsors
blocklist-ipsets | MISP | |
---|---|---|
39 | 28 | |
2,938 | 4,986 | |
2.3% | 1.7% | |
2.8 | 9.9 | |
7 days ago | about 10 hours ago | |
Shell | PHP | |
- | GNU Affero General Public License v3.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
blocklist-ipsets
- [Opnsensefirewall] Bloquer des IP malveillants avec un pare-feu OPNSENSE
-
Firewall Rules for a recently probed newbie?
Look into FireHol and its use of IPsets: https://firehol.org/guides/ipset/ | http://iplists.firehol.org/ - you can easily do what you’re wanting with these two.
- IPlist of bots/malicious actors
- Ask HN: What are these strange random strings spamming my blog?
-
A good malware/threat filtering choice on OPNSense
Yes, unfortunately i think this also happened other times with Firehol L3 (you can see https://github.com/firehol/blocklist-ipsets/issues/188) but thanks for the lists advice.
-
Creating a cyber threat intelligence tool
It sounds like you want to jump into game development before learning how to write "Hello, world!". Try using any of the open source tools that already do this and sign up for some "free" threat intel tools and learn the lay of the land. https://www.misp-project.org/ https://github.com/OpenCTI-Platform/opencti https://iplists.firehol.org/ https://www.greynoise.io/
-
Did anyone notice an abnormal increase in banned clients? These are my daily fail2ban ban count
I believe you are running SSH over default port 22 - feel free to change that. You can also use iplists from FireHOL to block any connection from blacklisted (on way or another) IPs - https://iplists.firehol.org/
- External Dynamic lists
-
blocklist-ipsets VS Lists - a user suggested alternative
2 projects | 19 Jan 2023
-
Show HN: A Golang package and tool to detect Tor exit IP addresses
Tor exits are tracked here [1] and in a few other block-list repos. The data is built from Tor's exit node list [2]
[1] - https://github.com/firehol/blocklist-ipsets
[2] - https://check.torproject.org/exit-addresses
MISP
- A recent abrupt change in Internet SSH brute force attacks against us
-
Free Tech Tools and Resources - Terraform for AWS, Cyberthreat Tool, Vim Training & More
MISP is an open-source solution to streamline the acquisition, retention, distribution, and collaborative exchange of critical cybersecurity indicators and threats. Timely-Lychee-5204 considers it "a threat intelligence platform for gathering, sharing, storing, and correlating indicators of compromise."
-
Top OpenSource/Free Cybersecurity Tools
MISP https://www.misp-project.org/
-
Creating a cyber threat intelligence tool
It sounds like you want to jump into game development before learning how to write "Hello, world!". Try using any of the open source tools that already do this and sign up for some "free" threat intel tools and learn the lay of the land. https://www.misp-project.org/ https://github.com/OpenCTI-Platform/opencti https://iplists.firehol.org/ https://www.greynoise.io/
- Threat intelligence IOC enrichments?
-
MISP at scale on Kubernetes
Yes but … the frontend/ui is still trying to check the health of each process by checking in /proc/{PID} like in previous and shows that the process maybe start but it couldn’t check if it’s alive or not. An issue was created and we’re waiting for the patch to be integrated in a future version.
- Have you ever tried to create your own module by following the guide in the github repo "misp-modules"?
-
Threat Intel with MITRE ATT&CK - how to document progress
You could use MISP to collect events and IOCs about threat actors and map their activity using Mitre ATTAC&K. Once you start building a knowledge base you can mainly focus on Threat actors who are interested in your sector.
-
Get CrowdSec IOCs feed into MISP
Is it possible to feed MISP with CrowdSec’s IOC lists?
-
How large are all feeds combined?
Also forgot to include this, for the blog post - yeah it should go up there soon. Until then it's to be found here: https://github.com/MISP/MISP/releases/tag/v2.4.160
What are some alternatives?
nginx-ultimate-bad-bot-blocker - Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders
opencti - Open Cyber Threat Intelligence Platform
firehol - A firewall for humans...
crits - CRITs - Collaborative Research Into Threats
crowdsec - CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
intelmq - IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
my-pihole-blocklists - Create custom pi-hole blocklists
SplunkDashboards - Collection of Dashboards for Threat Hunting and more!
ipsum - Daily feed of bad IPs (with blacklist hit scores)
elasticsearch-mapper-attachments - Mapper Attachments Type plugin for Elasticsearch
block - Let's make an annoyance free, better open internet, altogether!
cowrie - Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io