diff --git a/expansion/index.html b/expansion/index.html index a897c532..8b52db64 100644 --- a/expansion/index.html +++ b/expansion/index.html @@ -1114,15 +1114,6 @@ - - -
  • - - - vysion - - -
  • @@ -2208,15 +2199,6 @@ -
  • - -
  • - - - vysion - - -
  • @@ -3959,7 +3941,7 @@ A domain, hash (md5, sha1, sha256 or sha512), hostname or IP address attribute. MISP attributes and objects resulting from the parsing of the VirusTotal report concerning the input attribute. - references: - https://www.virustotal.com/ -- https://developers.virustotal.com/reference +- https://docs.virustotal.com/reference/overview - requirements: An access to the VirusTotal API (apikey), with a high request rate limit.

    @@ -3979,7 +3961,7 @@ A domain, hostname, ip, url or hash (md5, sha1, sha256 or sha512) attribute. MISP attributes and objects resulting from the parsing of the VirusTotal report concerning the input attribute. - references: - https://www.virustotal.com -- https://developers.virustotal.com/reference +- https://docs.virustotal.com/reference/overview - requirements: An access to the VirusTotal API (apikey)

    @@ -4058,25 +4040,6 @@ Text giving additional information about the CVE in input. - An access to the Vulners API


    -

    vysion

    -

    -

    Module to enrich the information by making use of the Vysion API. -- features:

    -
    -

    This module gets correlated information from our dark web intelligence database. With this you will get several objects containing information related to, for example, an organization victim of a ransomware attack. -- input: -MISP Attribute which include: company(target-org), country, info. -- output: -MISP objects containing title, link to our webapp and TOR, i2p or clearnet URLs. -- references: -- https://vysion.ai/ -- https://developers.vysion.ai/ -- https://github.com/ByronLabs/vysion-cti/tree/main -- requirements: -- Vysion python library -- Vysion API Key

    -
    -

    whois

    Module to query a local instance of uwhois (https://github.com/rafiot/uwhoisd). - features:

    diff --git a/index.html b/index.html index 64ae5834..2fb74e88 100644 --- a/index.html +++ b/index.html @@ -645,7 +645,6 @@ without modifying core components. The API is available via a simple REST API wh
  • EQL - an expansion module to generate event query language (EQL) from an attribute. Event Query Language
  • Farsight DNSDB Passive DNS - a hover and expansion module to expand hostname and IP addresses with passive DNS information.
  • GeoIP - a hover and expansion module to get GeoIP information from geolite/maxmind.
  • -
  • [Google Threat Intelligence] (https://github.com/MISP/misp-modules/tree/main/misp_modules/modules/expansion/google_threat_intelligence.py) - An expansion module to have the observable's threat score assessed by Google Threat Intelligence.
  • Greynoise - a hover to get information from greynoise.
  • hashdd - a hover module to check file hashes against hashdd.com including NSLR dataset.
  • hibp - a hover module to lookup against Have I Been Pwned?