Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.
-
Updated
May 25, 2022 - Python
Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.
Script to fetch data from virustotal and add it to a specific event as an object
Implementation of informaiton from MISP through the eCrimeLabs API and into SecurityOnion
Add a description, image, and links to the ecrimelabs topic page so that developers can more easily learn about it.
To associate your repository with the ecrimelabs topic, visit your repo's landing page and select "manage topics."