Converting coffee into MISP (he / him)
ID: 2797552962
http://www.misp-project.org/ 08-09-2014 09:35:47
4,4K Tweet
1,1K Followers
513 Following
After MISP2Sentinel already allowed you to share indicators from MISP with Microsoft Sentinel, you can now use a MISP (@[email protected]) playbook to create MISP events from Sentinel incidents, complete with entity-based indicators. Microsoft Threat Intelligence #cti #automation github.com/MISP/misp-play…
Omg, Saâd Kadhi (M: https://infosec.exchange/@saadk) , Adel Ka , Alexandre Dulaunoy @[email protected] , Raphaël Vinot - @[email protected], Thomas Patzke, tomchop, David -- 🇪🇺 😈 🇧🇪 , Ange , Hilko Bengen / @[email protected] and so many more. What is this, a conference or a DREAM team from all recorded speakers ever from Cooper? What a line up.
I created a small script to extract unique hostnames and domains from the DDoSia configuration objects shared via MISP (@[email protected]) . Post at vanimpe.eu/2024/10/08/ext… ; script: github.com/cudeso/tools/b… #DDOS
Simplify phishing investigations with the MISP (@[email protected]) "Query URL Reputation" playbook. Enrich URLs using Lookyloo urlscan.io VirusTotal , and more. #automation github.com/MISP/misp-play…
Justin Elze Thanks for sharing. It’s still a draft, open to contributions and updates. The main idea was to avoid « common words » being used and difficult to index or reference later. Don’t hesitate if you have proposals: github.com/MISP/misp-rfc/…