From 0b6bf160b9113f21ecfc535c29acb04e355500bf Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Wed, 10 Jun 2020 09:09:32 +0200 Subject: [PATCH] chg: [tools] sigmai added --- _pages/tools.md | 1 + 1 file changed, 1 insertion(+) diff --git a/_pages/tools.md b/_pages/tools.md index 54723fd..d87f11b 100644 --- a/_pages/tools.md +++ b/_pages/tools.md @@ -112,6 +112,7 @@ For the additional software created by the MISP project, check our [MISP project * [pymisp-suricata_search](https://github.com/raw-data/pymisp-suricata_search) - Multi-threaded Suricata search module for MISP. * [polarity MISP integration](https://github.com/polarityio/misp) - The Polarity MISP integration allows Polarity to search your instance of MISP to return valid information about domains, IPS, and hashes. * [Sigma2MISP](https://github.com/Neo23x0/sigma/blob/master/README.md#sigma2misp) - Import Sigma rules to MISP events. +* [Sigma Importer - sigmai](https://github.com/0xThiebaut/sigmai) is a project designed to do the opposite of Sigma. The objective of sigmai is to convert specific data sources into the Sigma generic and open signature format. * [Slackbot](https://github.com/MISP/MISP/tree/2.4/tools/misp-zmq) - Slackbot for notification of MISP events in Slack channels. * [Splunk integration with MISP](https://github.com/stricaud/TA-misp) - This TA allows to check if objects/attributes in your MISP instance matches your data in Splunk. * [surimisp](https://github.com/StamusNetworks/surimisp) - Check IOC provided by a MISP instance on Suricata events.