From 6dd34a3e8f3b0d2a39c5c6f60776a4337943866d Mon Sep 17 00:00:00 2001
From: Alexandre Dulaunoy
Date: Fri, 19 Jul 2024 17:29:35 +0200
Subject: [PATCH] Deployed 4711dcb with MkDocs version: 1.6.0
---
expansion/index.html | 41 ++---------------------------------------
index.html | 1 -
2 files changed, 2 insertions(+), 40 deletions(-)
diff --git a/expansion/index.html b/expansion/index.html
index a897c532..8b52db64 100644
--- a/expansion/index.html
+++ b/expansion/index.html
@@ -1114,15 +1114,6 @@
-
-
-
-
-
- vysion
-
-
-
@@ -2208,15 +2199,6 @@
-
-
-
-
-
- vysion
-
-
-
@@ -3959,7 +3941,7 @@ A domain, hash (md5, sha1, sha256 or sha512), hostname or IP address attribute.
MISP attributes and objects resulting from the parsing of the VirusTotal report concerning the input attribute.
- references:
- https://www.virustotal.com/
-- https://developers.virustotal.com/reference
+- https://docs.virustotal.com/reference/overview
- requirements:
An access to the VirusTotal API (apikey), with a high request rate limit.
@@ -3979,7 +3961,7 @@ A domain, hostname, ip, url or hash (md5, sha1, sha256 or sha512) attribute.
MISP attributes and objects resulting from the parsing of the VirusTotal report concerning the input attribute.
- references:
- https://www.virustotal.com
-- https://developers.virustotal.com/reference
+- https://docs.virustotal.com/reference/overview
- requirements:
An access to the VirusTotal API (apikey)
@@ -4058,25 +4040,6 @@ Text giving additional information about the CVE in input.
- An access to the Vulners API
-
-
-Module to enrich the information by making use of the Vysion API.
-- features:
-
-This module gets correlated information from our dark web intelligence database. With this you will get several objects containing information related to, for example, an organization victim of a ransomware attack.
-- input:
-MISP Attribute which include: company(target-org), country, info.
-- output:
-MISP objects containing title, link to our webapp and TOR, i2p or clearnet URLs.
-- references:
-- https://vysion.ai/
-- https://developers.vysion.ai/
-- https://github.com/ByronLabs/vysion-cti/tree/main
-- requirements:
-- Vysion python library
-- Vysion API Key
-
-
Module to query a local instance of uwhois (https://github.com/rafiot/uwhoisd).
- features:
diff --git a/index.html b/index.html
index 64ae5834..2fb74e88 100644
--- a/index.html
+++ b/index.html
@@ -645,7 +645,6 @@ without modifying core components. The API is available via a simple REST API wh
EQL - an expansion module to generate event query language (EQL) from an attribute. Event Query Language
Farsight DNSDB Passive DNS - a hover and expansion module to expand hostname and IP addresses with passive DNS information.
GeoIP - a hover and expansion module to get GeoIP information from geolite/maxmind.
-[Google Threat Intelligence] (https://github.com/MISP/misp-modules/tree/main/misp_modules/modules/expansion/google_threat_intelligence.py) - An expansion module to have the observable's threat score assessed by Google Threat Intelligence.
Greynoise - a hover to get information from greynoise.
hashdd - a hover module to check file hashes against hashdd.com including NSLR dataset.
hibp - a hover module to lookup against Have I Been Pwned?