flyscrape
PyMISP
flyscrape | PyMISP | |
---|---|---|
7 | 3 | |
980 | 422 | |
- | 1.7% | |
8.6 | 9.2 | |
2 months ago | 7 days ago | |
Go | Python | |
Mozilla Public License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
flyscrape
- Show HN: Flyscrape – A command-line web scraper for non-expert programmers
-
Web Scraping in Python – The Complete Guide
Shameless plug:
Flyscrape[0] lets you eliminate a lot of boilerplate code that is otherwise necessary when building a scraper from scratch, while still giving you the flexibility to extract data that perfectly fit your needs.
It comes as a single binary executable and runs small JavaScript files without having to deal with npm or node.
You can have a collection of small and isolated scraping scripts, rather than full on node projects.
[0]: https://github.com/philippta/flyscrape
- FLaNK Stack Weekly for 20 Nov 2023
- FLaNK Stack Weekly for 13 November 2023
-
Show HN: Flyscrape – A standalone and scriptable web scraper in Go
Thanks for sharing! Just a small nit: the links at the bottom of this page are broken [1].
[1]: https://github.com/philippta/flyscrape/blob/master/docs/read...
- Show HN: flyscrape – An expressive and elegant web scraper
PyMISP
- FLaNK Stack Weekly for 13 November 2023
-
Get CrowdSec IOCs feed into MISP
You might consider misp feed https://github.com/MISP/PyMISP/tree/main/examples/feed-generator, basically it’s the best way to collect IOCs and import them into a MISP instance. These feeds help to correlate IOCs without manually launching the MISP module every time for each IOC, this also reduce the workload on your API servers as the list is cached locally on the MISP and updated every day.
-
Ingesting IOCs in to CS from MISP
If you're in Python, you can use PyMISP to login and get the new indicators, and then FalconPy to import them into your CrowdStrike tenant. (Basically the reverse of what the MISP-tools example is doing. You could start here and alter the logic.)
What are some alternatives?
cucim - cuCIM - RAPIDS GPU-accelerated image processing library
MISP-QRadar-Integration - The Project can be used to integrate QRadar with MISP Threat Sharing Platform
awesome-emulators - An awesome list of emulators!
yeti - Your Everyday Threat Intelligence
engblogs - learn from your favorite tech companies
vimGPT - Browse the web with GPT-4V and Vimium
clipea - 📎🟢 Like Clippy but for the CLI. A blazing fast AI helper for your command line
CML_AMP_Intelligent-QA-Chatbot-with-NiFi-Pinecone-and-Llama2 - The prototype deploys an Application in CML using a Llama2 model from Hugging Face to answer questions augmented with knowledge extracted from the website. This prototype introduces Pinecone as a database for storing vectors for semantic search.
MISP-tools - Import CrowdStrike Threat Intelligence into your instance of MISP
PaK-Stocks - Stocks