You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Alexandre Dulaunoy 9e9a9fa416
chg: [doc] updated
5 months ago
best-practices chg: [clean-up] various updates and some refs to new features 5 months ago chg: [book] Various improvements in all sections. Some logical re-ordering in the main Book. 4 years ago
book.adoc fix: [book] glossary 5 months ago
book.html chg: [doc] updated 5 months ago
book.pdf chg: [doc] updated 5 months ago chg: [doc] updated 5 months ago

Best Practices in Threat Intelligence

The aim of this book is to compile the best practices in threat intelligence analysis. Whilst it can be used as a general guide, it is based on the open source threat intelligence platform called MISP, for practical reasons.

The book is available in PDF and HTML format.

How To Contribute

  1. Fork the project
  2. Add your best practice in the directory best-practices in asciidoctor format and don't forget to include the file in book.adoc
  3. Make a pull-request


The book is licensed under the AGPL version 3.