Showing content from https://github.com/MISP/best-practices-in-threat-intelligence below:
MISP/best-practices-in-threat-intelligence: Best practices in threat intelligence
Skip to content Navigation Menu
Search code, repositories, users, issues, pull requests...
Saved searches Use saved searches to filter your results more quickly
Sign up You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert MISP/best-practices-in-threat-intelligence Repository files navigation
Best Practices in Threat Intelligence
The aim of this book is to compile the best practices in threat intelligence analysis. Whilst it can be used as a general guide, it is based on the open source threat intelligence platform called MISP, for practical reasons.
The book is available in PDF and HTML format.
- Fork the project
- Add your best practice in the directory best-practices in asciidoctor format and don't forget to include the file in book.adoc
- Make a pull-request
The book is licensed under the AGPL version 3.
About
Best practices in threat intelligence
Topics Resources Stars Watchers Forks
You can’t perform that action at this time.
RetroSearch is an open source project built by @garambo
| Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4