mirror of https://github.com/MISP/misp-website
chg: [home] more descriptions on the homepage
parent
9c97bb5ac5
commit
75adc3e7a5
|
@ -1,4 +1,4 @@
|
|||
text: ""
|
||||
text: "The MISP is an open source software solution for collecting, storing, distributing and sharing cyber security indicators and threats about cyber security incidents analysis and malware analysis. MISP is designed by and for incident analysts, security and ICT professionals or malware reversers to support their day-to-day operations to share structured information efficiently."
|
||||
name: "MISP Portal"
|
||||
position: ""
|
||||
avatar: "img/testimonials/misp.png"
|
|
@ -1,4 +1,4 @@
|
|||
text: "Many MISP galaxy clusters are already available like MITRE ATT&CK, Exploit-Kit, Microsoft Activity Group actor, Preventive Measure, Ransomware, TDS, Threat actor or Tool used by adversaries. \n\nTaxonomies provide a set of already defined classifications modeling estimative language, CSIRTs/CERTs classifications, national classifications or threat model classification."
|
||||
text: "Many MISP [galaxy clusters](datamodels/#misp-galaxy) are already available like MITRE ATT&CK, Exploit-Kit, Microsoft Activity Group actor, Preventive Measure, Ransomware, TDS, Threat actor or Tool used by adversaries. \n\n[Taxonomies](datamodels/#misp-taxonomies) provide a set of already defined classifications modeling estimative language, CSIRTs/CERTs classifications, national classifications or threat model classification."
|
||||
name: "MISP Galaxies & Taxonomies"
|
||||
position: ""
|
||||
avatar: "img/testimonials/galaxy.png"
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
text: "TODO balblabla training, education, learning, best practices, ... Free & paid courses available"
|
||||
name: "MISP Docu & Trainings"
|
||||
position: ""
|
||||
avatar: "img/testimonials/book.png"
|
||||
text: "In a continuous effort since 2016, [CIRCL](https://www.circl.lu) frequently gives practical training sessions about MISP. The purpose is to reach out to security analysts using MISP as a threat intelligence platform along with users using it as an information sharing platform.\n\n
|
||||
All the [training materials]([https://github.com/MISP/misp-training) are open source, include slides and a virtual machine preconfigured with the latest version of MISP. [Reach out](professional-services) if you are looking for custom training."
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
text: ""
|
||||
text: "[PyMISP](https://github.com/MISP/PyMISP) is a Python library to access MISP platforms via their REST API. \n\n
|
||||
PyMISP allows you to fetch events, add or update events/attributes, add or update samples or search for attributes programmatically. [Discover more](https://github.com/MISP/PyMISP)"
|
||||
name: "PyMISP"
|
||||
position: ""
|
||||
avatar: "img/testimonials/pymisp.png"
|
||||
|
|
|
@ -1,4 +1,8 @@
|
|||
text: "TODO"
|
||||
text: "MISP modules are autonomous modules that can be used to extend MISP for new services such as expansion, import and export.
|
||||
\n\n
|
||||
The modules are written in Python 3 following a simple API interface. The objective is to ease the extensions of MISP functionalities without modifying core components.
|
||||
\n\n
|
||||
For more information: [Extending MISP with Python modules](https://www.misp-project.org/misp-training/3.1-misp-modules.pdf) slides from MISP [training](https://github.com/MISP/misp-training)."
|
||||
name: "MISP Modules"
|
||||
position: ""
|
||||
avatar: "img/testimonials/modules.png"
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
text: "TODO https://github.com/MISP/misp-stix"
|
||||
name: "STIX & TAXII"
|
||||
position: ""
|
||||
avatar: "img/testimonials/stix.png"
|
||||
# text: "TODO https://github.com/MISP/misp-stix"
|
||||
# name: "STIX & TAXII"
|
||||
# position: ""
|
||||
# avatar: "img/testimonials/stix.png"
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
text: "TODO"
|
||||
name: "MITRE ATT&CK"
|
||||
position: ""
|
||||
avatar: "img/testimonials/mitre_attack.png"
|
||||
# text: "TODO"
|
||||
# name: "MITRE ATT&CK"
|
||||
# position: ""
|
||||
# avatar: "img/testimonials/mitre_attack.png"
|
||||
|
|
Loading…
Reference in New Issue