From 307fec22a959706dd61ccfa908ccbf27de3cdf84 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Wed, 27 Dec 2017 09:28:10 +0100 Subject: [PATCH] MISP TA for Splunk added --- _pages/tools.md | 1 + 1 file changed, 1 insertion(+) diff --git a/_pages/tools.md b/_pages/tools.md index f91def5..1c43be6 100755 --- a/_pages/tools.md +++ b/_pages/tools.md @@ -61,3 +61,4 @@ For the additional software created by the MISP project, check our [MISP project * [misp-bulk-tag](https://github.com/morallo/misp-bulk-tag) - this script performs bulk tagging operations over MISP. * [polarity MISP integration](https://github.com/polarityio/misp) - The Polarity MISP integration allows Polarity to search your instance of MISP to return valid information about domains, IPS, and hashes. * [AIL framework - Framework for Analysis of Information Leaks](https://github.com/CIRCL/AIL-framework) - AIL framework - Framework for Analysis of Information Leaks use MISP to share found leaks within a threat intelligence platform using MISP standard (objects). +* [Splunk integration with MISP](https://github.com/stricaud/TA-misp) - This TA allows to check if objects/attributes in your MISP instance matches your data in Splunk.