mirror of https://github.com/MISP/misp-modules
96712da5e0
- Takes an AssemblyLine submission link to query the API and get the full submission report - Parses the potentially malicious files and the IPs, domains or URLs they are connecting to - Possible improvement of the parsing filters in order to include more data in the MISP event |
||
---|---|---|
.. | ||
expansion | ||
export_mod | ||
import_mod | ||
__init__.py |