mirror of https://github.com/MISP/misp-modules
![]() - Takes an AssemblyLine submission link to query the API and get the full submission report - Parses the potentially malicious files and the IPs, domains or URLs they are connecting to - Possible improvement of the parsing filters in order to include more data in the MISP event |
||
---|---|---|
.. | ||
helpers | ||
lib | ||
modules | ||
__init__.py |