MISP-MCP-SERVER

MISP-MCP-SERVER

3.3

If you are the rightful owner of MISP-MCP-SERVER and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

A Model Context Protocol (MCP) server that integrates with the MISP (Malware Information Sharing Platform) to provide threat intelligence capabilities to Large Language Models.

The MISP MCP Server is designed to enhance the capabilities of Large Language Models by integrating with the Malware Information Sharing Platform (MISP). It provides a robust framework for accessing and utilizing threat intelligence data, allowing users to detect and analyze malware across various platforms such as Windows, macOS, Linux, Android, iOS, and IoT devices. The server offers advanced search capabilities, enabling users to query MISP data by attribute type, tag, threat actor, or TLP classification. Additionally, it supports the submission of new Indicators of Compromise (IoCs) directly to a MISP instance and the generation of comprehensive threat intelligence reports. The server is built with Python and requires a MISP instance with API access, making it a powerful tool for cybersecurity professionals seeking to leverage MISP data in their threat analysis workflows.

Features

  • Mac Malware Detection: Search for the latest macOS-related malware samples.
  • Cross-Platform Threat Intelligence: Search for threats affecting Windows, macOS, Linux, Android, iOS, and IoT devices.
  • Advanced Search Capabilities: Search by attribute type, tag, threat actor, or TLP classification.
  • IoC Submission: Submit new Indicators of Compromise directly to your MISP instance.
  • Threat Intelligence Reports: Generate comprehensive reports based on MISP data.

Tools

  1. get_mac_malware

    Get the latest Mac-related malware samples from MISP.

  2. get_platform_malware

    Get the latest malware samples for a specific platform from MISP.

  3. advanced_search

    Perform advanced searches in MISP.

  4. submit_ioc

    Submit a new Indicator of Compromise (IoC) to MISP.

  5. generate_threat_report

    Generate a comprehensive threat intelligence report based on MISP data.