From b95cdef25382eed3331c2a4002896c2d7373a814 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Tue, 2 Jan 2018 09:20:56 +0100 Subject: [PATCH] add: tool misp42splunk added --- _pages/tools.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/_pages/tools.md b/_pages/tools.md index 07a02a0..a069bb0 100755 --- a/_pages/tools.md +++ b/_pages/tools.md @@ -63,3 +63,5 @@ For the additional software created by the MISP project, check our [MISP project * [AIL framework - Framework for Analysis of Information Leaks](https://github.com/CIRCL/AIL-framework) - AIL framework - Framework for Analysis of Information Leaks use MISP to share found leaks within a threat intelligence platform using MISP standard (objects). * [Splunk integration with MISP](https://github.com/stricaud/TA-misp) - This TA allows to check if objects/attributes in your MISP instance matches your data in Splunk. * [pymisp-suricata_search](https://github.com/raw-data/pymisp-suricata_search) - Multi-threaded Suricata search module for MISP. +* [misp42splunk](https://github.com/remg427/misp42splunk) - A Splunk app to use MISP in background. +