Deployed 4b1b182 with MkDocs version: 1.0.4

gh-pages
Alexandre Dulaunoy 2020-10-21 08:39:03 +01:00
parent acdeaf5ae9
commit b435b9db42
13 changed files with 378 additions and 43 deletions

View File

@ -386,6 +386,13 @@
cve
</a>
</li>
<li class="md-nav__item">
<a href="#cve_advanced" title="cve_advanced" class="md-nav__link">
cve_advanced
</a>
</li>
<li class="md-nav__item">
@ -410,8 +417,8 @@
</li>
<li class="md-nav__item">
<a href="#docx-enrich" title="docx-enrich" class="md-nav__link">
docx-enrich
<a href="#docx_enrich" title="docx_enrich" class="md-nav__link">
docx_enrich
</a>
</li>
@ -442,6 +449,20 @@
farsight_passivedns
</a>
</li>
<li class="md-nav__item">
<a href="#geoip_asn" title="geoip_asn" class="md-nav__link">
geoip_asn
</a>
</li>
<li class="md-nav__item">
<a href="#geoip_city" title="geoip_city" class="md-nav__link">
geoip_city
</a>
</li>
<li class="md-nav__item">
@ -449,6 +470,13 @@
geoip_country
</a>
</li>
<li class="md-nav__item">
<a href="#google_search" title="google_search" class="md-nav__link">
google_search
</a>
</li>
<li class="md-nav__item">
@ -470,6 +498,13 @@
hibp
</a>
</li>
<li class="md-nav__item">
<a href="#intel471" title="intel471" class="md-nav__link">
intel471
</a>
</li>
<li class="md-nav__item">
@ -543,22 +578,22 @@
</li>
<li class="md-nav__item">
<a href="#ocr-enrich" title="ocr-enrich" class="md-nav__link">
ocr-enrich
<a href="#ocr_enrich" title="ocr_enrich" class="md-nav__link">
ocr_enrich
</a>
</li>
<li class="md-nav__item">
<a href="#ods-enrich" title="ods-enrich" class="md-nav__link">
ods-enrich
<a href="#ods_enrich" title="ods_enrich" class="md-nav__link">
ods_enrich
</a>
</li>
<li class="md-nav__item">
<a href="#odt-enrich" title="odt-enrich" class="md-nav__link">
odt-enrich
<a href="#odt_enrich" title="odt_enrich" class="md-nav__link">
odt_enrich
</a>
</li>
@ -592,15 +627,15 @@
</li>
<li class="md-nav__item">
<a href="#pdf-enrich" title="pdf-enrich" class="md-nav__link">
pdf-enrich
<a href="#pdf_enrich" title="pdf_enrich" class="md-nav__link">
pdf_enrich
</a>
</li>
<li class="md-nav__item">
<a href="#pptx-enrich" title="pptx-enrich" class="md-nav__link">
pptx-enrich
<a href="#pptx_enrich" title="pptx_enrich" class="md-nav__link">
pptx_enrich
</a>
</li>
@ -610,6 +645,13 @@
qrcode
</a>
</li>
<li class="md-nav__item">
<a href="#ransomcoindb" title="ransomcoindb" class="md-nav__link">
ransomcoindb
</a>
</li>
<li class="md-nav__item">
@ -659,6 +701,13 @@
sigma_syntax_validator
</a>
</li>
<li class="md-nav__item">
<a href="#sophoslabs_intelix" title="sophoslabs_intelix" class="md-nav__link">
sophoslabs_intelix
</a>
</li>
<li class="md-nav__item">
@ -767,8 +816,8 @@
</li>
<li class="md-nav__item">
<a href="#xlsx-enrich" title="xlsx-enrich" class="md-nav__link">
xlsx-enrich
<a href="#xlsx_enrich" title="xlsx_enrich" class="md-nav__link">
xlsx_enrich
</a>
</li>
@ -1008,6 +1057,13 @@
cve
</a>
</li>
<li class="md-nav__item">
<a href="#cve_advanced" title="cve_advanced" class="md-nav__link">
cve_advanced
</a>
</li>
<li class="md-nav__item">
@ -1032,8 +1088,8 @@
</li>
<li class="md-nav__item">
<a href="#docx-enrich" title="docx-enrich" class="md-nav__link">
docx-enrich
<a href="#docx_enrich" title="docx_enrich" class="md-nav__link">
docx_enrich
</a>
</li>
@ -1064,6 +1120,20 @@
farsight_passivedns
</a>
</li>
<li class="md-nav__item">
<a href="#geoip_asn" title="geoip_asn" class="md-nav__link">
geoip_asn
</a>
</li>
<li class="md-nav__item">
<a href="#geoip_city" title="geoip_city" class="md-nav__link">
geoip_city
</a>
</li>
<li class="md-nav__item">
@ -1071,6 +1141,13 @@
geoip_country
</a>
</li>
<li class="md-nav__item">
<a href="#google_search" title="google_search" class="md-nav__link">
google_search
</a>
</li>
<li class="md-nav__item">
@ -1092,6 +1169,13 @@
hibp
</a>
</li>
<li class="md-nav__item">
<a href="#intel471" title="intel471" class="md-nav__link">
intel471
</a>
</li>
<li class="md-nav__item">
@ -1165,22 +1249,22 @@
</li>
<li class="md-nav__item">
<a href="#ocr-enrich" title="ocr-enrich" class="md-nav__link">
ocr-enrich
<a href="#ocr_enrich" title="ocr_enrich" class="md-nav__link">
ocr_enrich
</a>
</li>
<li class="md-nav__item">
<a href="#ods-enrich" title="ods-enrich" class="md-nav__link">
ods-enrich
<a href="#ods_enrich" title="ods_enrich" class="md-nav__link">
ods_enrich
</a>
</li>
<li class="md-nav__item">
<a href="#odt-enrich" title="odt-enrich" class="md-nav__link">
odt-enrich
<a href="#odt_enrich" title="odt_enrich" class="md-nav__link">
odt_enrich
</a>
</li>
@ -1214,15 +1298,15 @@
</li>
<li class="md-nav__item">
<a href="#pdf-enrich" title="pdf-enrich" class="md-nav__link">
pdf-enrich
<a href="#pdf_enrich" title="pdf_enrich" class="md-nav__link">
pdf_enrich
</a>
</li>
<li class="md-nav__item">
<a href="#pptx-enrich" title="pptx-enrich" class="md-nav__link">
pptx-enrich
<a href="#pptx_enrich" title="pptx_enrich" class="md-nav__link">
pptx_enrich
</a>
</li>
@ -1232,6 +1316,13 @@
qrcode
</a>
</li>
<li class="md-nav__item">
<a href="#ransomcoindb" title="ransomcoindb" class="md-nav__link">
ransomcoindb
</a>
</li>
<li class="md-nav__item">
@ -1281,6 +1372,13 @@
sigma_syntax_validator
</a>
</li>
<li class="md-nav__item">
<a href="#sophoslabs_intelix" title="sophoslabs_intelix" class="md-nav__link">
sophoslabs_intelix
</a>
</li>
<li class="md-nav__item">
@ -1389,8 +1487,8 @@
</li>
<li class="md-nav__item">
<a href="#xlsx-enrich" title="xlsx-enrich" class="md-nav__link">
xlsx-enrich
<a href="#xlsx_enrich" title="xlsx_enrich" class="md-nav__link">
xlsx_enrich
</a>
</li>
@ -1701,6 +1799,22 @@ Text giving information about the CVE related to the Vulnerability.
<a href="https://cve.circl.lu/">https://cve.circl.lu/</a>, <a href="https://cve.mitre.org/">https://cve.mitre.org/</a></p>
</blockquote>
<hr />
<h4 id="cve_advanced"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/cve_advanced.py">cve_advanced</a><a class="headerlink" href="#cve_advanced" title="Permanent link">&para;</a></h4>
<p><img src=logos/cve.png height=60></p>
<p>An expansion module to query the CIRCL CVE search API for more information about a vulnerability (CVE).
- <strong>features</strong>:</p>
<blockquote>
<p>The module takes a vulnerability attribute as input and queries the CIRCL CVE search API to gather additional information.</p>
<p>The result of the query is then parsed to return additional information about the vulnerability, like its cvss score or some references, as well as the potential related weaknesses and attack patterns.</p>
<p>The vulnerability additional data is returned in a vulnerability MISP object, and the related additional information are put into weakness and attack-pattern MISP objects.
- <strong>input</strong>:
Vulnerability attribute.
- <strong>output</strong>:
Additional information about the vulnerability, such as its cvss score, some references, or the related weaknesses and attack patterns.
- <strong>references</strong>:
<a href="https://cve.circl.lu">https://cve.circl.lu</a>, https://cve/mitre.org/</p>
</blockquote>
<hr />
<h4 id="cytomic_orion"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/cytomic_orion.py">cytomic_orion</a><a class="headerlink" href="#cytomic_orion" title="Permanent link">&para;</a></h4>
<p><img src=logos/cytomic_orion.png height=60></p>
<p>An expansion module to enrich attributes in MISP by quering the Cytomic Orion API
@ -1750,7 +1864,7 @@ IP address resolving the input.
dnspython3: DNS python3 library</p>
</blockquote>
<hr />
<h4 id="docx-enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/docx-enrich.py">docx-enrich</a><a class="headerlink" href="#docx-enrich" title="Permanent link">&para;</a></h4>
<h4 id="docx_enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/docx_enrich.py">docx_enrich</a><a class="headerlink" href="#docx_enrich" title="Permanent link">&para;</a></h4>
<p><img src=logos/docx.png height=60></p>
<p>Module to extract freetext from a .docx document.
- <strong>features</strong>:</p>
@ -1845,6 +1959,39 @@ Text containing information about the input, resulting from the query on the Far
An access to the Farsight Passive DNS API (apikey)</p>
</blockquote>
<hr />
<h4 id="geoip_asn"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/geoip_asn.py">geoip_asn</a><a class="headerlink" href="#geoip_asn" title="Permanent link">&para;</a></h4>
<p><img src=logos/maxmind.png height=60>
- <strong>descrption</strong>:</p>
<blockquote>
<p>An expansion module to query a local copy of Maxmind's Geolite database with an IP address, in order to get information about its related AS number.
- <strong>features</strong>:
The module takes an IP address attribute as input and queries a local copy of the Maxmind's Geolite database to get information about the related AS number.
- <strong>input</strong>:
An IP address MISP attribute.
- <strong>output</strong>:
Text containing information about the AS number of the IP address.
- <strong>references</strong>:
<a href="https://www.maxmind.com/en/home">https://www.maxmind.com/en/home</a>
- <strong>requirements</strong>:
A local copy of Maxmind's Geolite database</p>
</blockquote>
<hr />
<h4 id="geoip_city"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/geoip_city.py">geoip_city</a><a class="headerlink" href="#geoip_city" title="Permanent link">&para;</a></h4>
<p><img src=logos/maxmind.png height=60></p>
<p>An expansion module to query a local copy of Maxmind's Geolite database with an IP address, in order to get information about the city where it is located.
- <strong>features</strong>:</p>
<blockquote>
<p>The module takes an IP address attribute as input and queries a local copy of the Maxmind's Geolite database to get information about the city where this IP address is located.
- <strong>input</strong>:
An IP address MISP attribute.
- <strong>output</strong>:
Text containing information about the city where the IP address is located.
- <strong>references</strong>:
<a href="https://www.maxmind.com/en/home">https://www.maxmind.com/en/home</a>
- <strong>requirements</strong>:
A local copy of Maxmind's Geolite database</p>
</blockquote>
<hr />
<h4 id="geoip_country"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/geoip_country.py">geoip_country</a><a class="headerlink" href="#geoip_country" title="Permanent link">&para;</a></h4>
<p><img src=logos/maxmind.png height=60></p>
<p>Module to query a local copy of Maxmind's Geolite database.
@ -1862,6 +2009,23 @@ Text containing information about the location of the IP address.
A local copy of Maxmind's Geolite database</p>
</blockquote>
<hr />
<h4 id="google_search"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/google_search.py">google_search</a><a class="headerlink" href="#google_search" title="Permanent link">&para;</a></h4>
<p><img src=logos/google.png height=60>
- <strong>descrption</strong>:</p>
<blockquote>
<p>A hover module to get information about an url using a Google search.
- <strong>features</strong>:
The module takes an url as input to query the Google search API. The result of the query is then return as raw text.
- <strong>input</strong>:
An url attribute.
- <strong>output</strong>:
Text containing the result of a Google search on the input url.
- <strong>references</strong>:
<a href="https://github.com/abenassi/Google-Search-API">https://github.com/abenassi/Google-Search-API</a>
- <strong>requirements</strong>:
The python Google Search API library</p>
</blockquote>
<hr />
<h4 id="greynoise"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/greynoise.py">greynoise</a><a class="headerlink" href="#greynoise" title="Permanent link">&para;</a></h4>
<p><img src=logos/greynoise.png height=60></p>
<p>Module to access GreyNoise.io API
@ -1905,6 +2069,36 @@ Additional information about the email address.
<a href="https://haveibeenpwned.com/">https://haveibeenpwned.com/</a></p>
</blockquote>
<hr />
<h4 id="intel471"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/intel471.py">intel471</a><a class="headerlink" href="#intel471" title="Permanent link">&para;</a></h4>
<p><img src=logos/intel471.png height=60>
- <strong>descrption</strong>:</p>
<blockquote>
<p>An expansion module to query Intel471 in order to get additional information about a domain, ip address, email address, url or hash.
- <strong>features</strong>:
The module uses the Intel471 python library to query the Intel471 API with the value of the input attribute. The result of the query is then returned as freetext so the Freetext import parses it.
- <strong>input</strong>:
A MISP attribute whose type is included in the following list:
- hostname
- domain
- url
- ip-src
- ip-dst
- email-src
- email-dst
- target-email
- whois-registrant-email
- whois-registrant-name
- md5
- sha1
- sha256
- <strong>output</strong>:
Freetext
- <strong>references</strong>:
<a href="https://public.intel471.com/">https://public.intel471.com/</a>
- <strong>requirements</strong>:
The intel471 python library</p>
</blockquote>
<hr />
<h4 id="intelmq_eventdb"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/intelmq_eventdb.py">intelmq_eventdb</a><a class="headerlink" href="#intelmq_eventdb" title="Permanent link">&para;</a></h4>
<p><img src=logos/intelmq.png height=60></p>
<p>Module to access intelmqs eventdb.
@ -2069,7 +2263,7 @@ File object(s) related to the input attribute found on MALWAREbazaar databases.
<a href="https://bazaar.abuse.ch/">https://bazaar.abuse.ch/</a></p>
</blockquote>
<hr />
<h4 id="ocr-enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/ocr-enrich.py">ocr-enrich</a><a class="headerlink" href="#ocr-enrich" title="Permanent link">&para;</a></h4>
<h4 id="ocr_enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/ocr_enrich.py">ocr_enrich</a><a class="headerlink" href="#ocr_enrich" title="Permanent link">&para;</a></h4>
<p>Module to process some optical character recognition on pictures.
- <strong>features</strong>:</p>
<blockquote>
@ -2082,7 +2276,7 @@ Text and freetext fetched from the input picture.
cv2: The OpenCV python library.</p>
</blockquote>
<hr />
<h4 id="ods-enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/ods-enrich.py">ods-enrich</a><a class="headerlink" href="#ods-enrich" title="Permanent link">&para;</a></h4>
<h4 id="ods_enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/ods_enrich.py">ods_enrich</a><a class="headerlink" href="#ods_enrich" title="Permanent link">&para;</a></h4>
<p><img src=logos/ods.png height=60></p>
<p>Module to extract freetext from a .ods document.
- <strong>features</strong>:</p>
@ -2096,7 +2290,7 @@ Text and freetext parsed from the document.
ezodf: Python package to create/manipulate OpenDocumentFormat files., pandas_ods_reader: Python library to read in ODS files.</p>
</blockquote>
<hr />
<h4 id="odt-enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/odt-enrich.py">odt-enrich</a><a class="headerlink" href="#odt-enrich" title="Permanent link">&para;</a></h4>
<h4 id="odt_enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/odt_enrich.py">odt_enrich</a><a class="headerlink" href="#odt_enrich" title="Permanent link">&para;</a></h4>
<p><img src=logos/odt.png height=60></p>
<p>Module to extract freetext from a .odt document.
- <strong>features</strong>:</p>
@ -2233,7 +2427,7 @@ An access to the OTX API (apikey)</p>
</li>
</ul>
<hr />
<h4 id="pdf-enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/pdf-enrich.py">pdf-enrich</a><a class="headerlink" href="#pdf-enrich" title="Permanent link">&para;</a></h4>
<h4 id="pdf_enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/pdf_enrich.py">pdf_enrich</a><a class="headerlink" href="#pdf_enrich" title="Permanent link">&para;</a></h4>
<p><img src=logos/pdf.jpg height=60></p>
<p>Module to extract freetext from a PDF document.
- <strong>features</strong>:</p>
@ -2247,7 +2441,7 @@ Text and freetext parsed from the document.
pdftotext: Python library to extract text from PDF.</p>
</blockquote>
<hr />
<h4 id="pptx-enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/pptx-enrich.py">pptx-enrich</a><a class="headerlink" href="#pptx-enrich" title="Permanent link">&para;</a></h4>
<h4 id="pptx_enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/pptx_enrich.py">pptx_enrich</a><a class="headerlink" href="#pptx_enrich" title="Permanent link">&para;</a></h4>
<p><img src=logos/pptx.png height=60></p>
<p>Module to extract freetext from a .pptx document.
- <strong>features</strong>:</p>
@ -2274,6 +2468,35 @@ The URL or bitcoin address the QR code is pointing to.
cv2: The OpenCV python library., pyzbar: Python library to read QR codes.</p>
</blockquote>
<hr />
<h4 id="ransomcoindb"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/ransomcoindb.py">ransomcoindb</a><a class="headerlink" href="#ransomcoindb" title="Permanent link">&para;</a></h4>
<ul>
<li><strong>descrption</strong>:<blockquote>
<p>Module to access the ransomcoinDB with a hash or btc address attribute and get the associated btc address of hashes.</p>
</blockquote>
</li>
<li><strong>features</strong>:<blockquote>
<p>The module takes either a hash attribute or a btc attribute as input to query the ransomcoinDB API for some additional data.</p>
<p>If the input is a btc address, we will get the associated hashes returned in a file MISP object. If we query ransomcoinDB with a hash, the response contains the associated btc addresses returned as single MISP btc attributes.</p>
</blockquote>
</li>
<li><strong>input</strong>:<blockquote>
<p>A hash (md5, sha1 or sha256) or btc attribute.</p>
</blockquote>
</li>
<li><strong>output</strong>:<blockquote>
<p>Hashes associated to a btc address or btc addresses associated to a hash.</p>
</blockquote>
</li>
<li><strong>references</strong>:<blockquote>
<p><a href="https://ransomcoindb.concinnity-risks.com">https://ransomcoindb.concinnity-risks.com</a></p>
</blockquote>
</li>
<li><strong>requirements</strong>:<blockquote>
<p>A ransomcoinDB API key.</p>
</blockquote>
</li>
</ul>
<hr />
<h4 id="rbl"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/rbl.py">rbl</a><a class="headerlink" href="#rbl" title="Permanent link">&para;</a></h4>
<p>Module to check an IPv4 address against known RBLs.
- <strong>features</strong>:</p>
@ -2399,6 +2622,22 @@ Text describing the validity of the Sigma rule.
Sigma python library, Yaml python library</p>
</blockquote>
<hr />
<h4 id="sophoslabs_intelix"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/sophoslabs_intelix.py">sophoslabs_intelix</a><a class="headerlink" href="#sophoslabs_intelix" title="Permanent link">&para;</a></h4>
<p><img src=logos/sophoslabs_intelix.svg height=60></p>
<p>An expansion module to query the Sophoslabs intelix API to get additional information about an ip address, url, domain or sha256 attribute.
- <strong>features</strong>:</p>
<blockquote>
<p>The module takes an ip address, url, domain or sha256 attribute and queries the SophosLabs Intelix API with the attribute value. The result of this query is a SophosLabs Intelix hash report, or an ip or url lookup, that is then parsed and returned in a MISP object.
- <strong>input</strong>:
An ip address, url, domain or sha256 attribute.
- <strong>output</strong>:
SophosLabs Intelix report and lookup objects
- <strong>references</strong>:
<a href="https://aws.amazon.com/marketplace/pp/B07SLZPMCS">https://aws.amazon.com/marketplace/pp/B07SLZPMCS</a>
- <strong>requirements</strong>:
A client_id and client_secret pair to authenticate to the SophosLabs Intelix API</p>
</blockquote>
<hr />
<h4 id="sourcecache"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/sourcecache.py">sourcecache</a><a class="headerlink" href="#sourcecache" title="Permanent link">&para;</a></h4>
<p>Module to cache web pages of analysis reports, OSINT sources. The module returns a link of the cached page.
- <strong>features</strong>:</p>
@ -2707,7 +2946,7 @@ MISP attributes mapped from the result of the query on X-Force Exchange.
An access to the X-Force API (apikey)</p>
</blockquote>
<hr />
<h4 id="xlsx-enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/xlsx-enrich.py">xlsx-enrich</a><a class="headerlink" href="#xlsx-enrich" title="Permanent link">&para;</a></h4>
<h4 id="xlsx_enrich"><a href="https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/xlsx_enrich.py">xlsx_enrich</a><a class="headerlink" href="#xlsx_enrich" title="Permanent link">&para;</a></h4>
<p><img src=logos/xlsx.png height=60></p>
<p>Module to extract freetext from a .xlsx document.
- <strong>features</strong>:</p>

BIN
expansion/logos/google.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 16 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.6 KiB

File diff suppressed because one or more lines are too long

After

Width:  |  Height:  |  Size: 26 KiB

BIN
export_mod/logos/google.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 16 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.6 KiB

File diff suppressed because one or more lines are too long

After

Width:  |  Height:  |  Size: 26 KiB

BIN
import_mod/logos/google.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 16 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.6 KiB

File diff suppressed because one or more lines are too long

After

Width:  |  Height:  |  Size: 26 KiB

File diff suppressed because one or more lines are too long

View File

@ -2,37 +2,37 @@
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://www.misp-project.org/</loc>
<lastmod>2020-09-29</lastmod>
<lastmod>2020-10-21</lastmod>
<changefreq>daily</changefreq>
</url>
<url>
<loc>https://www.misp-project.org/expansion/</loc>
<lastmod>2020-09-29</lastmod>
<lastmod>2020-10-21</lastmod>
<changefreq>daily</changefreq>
</url>
<url>
<loc>https://www.misp-project.org/export_mod/</loc>
<lastmod>2020-09-29</lastmod>
<lastmod>2020-10-21</lastmod>
<changefreq>daily</changefreq>
</url>
<url>
<loc>https://www.misp-project.org/import_mod/</loc>
<lastmod>2020-09-29</lastmod>
<lastmod>2020-10-21</lastmod>
<changefreq>daily</changefreq>
</url>
<url>
<loc>https://www.misp-project.org/install/</loc>
<lastmod>2020-09-29</lastmod>
<lastmod>2020-10-21</lastmod>
<changefreq>daily</changefreq>
</url>
<url>
<loc>https://www.misp-project.org/contribute/</loc>
<lastmod>2020-09-29</lastmod>
<lastmod>2020-10-21</lastmod>
<changefreq>daily</changefreq>
</url>
<url>
<loc>https://www.misp-project.org/license/</loc>
<lastmod>2020-09-29</lastmod>
<lastmod>2020-10-21</lastmod>
<changefreq>daily</changefreq>
</url>
</urlset>

Binary file not shown.