Python API for MISP threat intelligence platform enabling programmatic access to MISP instances.
Overall
score
96%
Comprehensive tagging and classification system management including taxonomies, warning lists, custom tags, and hierarchical classification structures.
Create, manage, and apply tags for data classification and organization.
def tags(self, **kwargs) -> list:
"""List available tags."""
def get_tag(self, tag_id: Union[int, str]) -> dict:
"""Get specific tag details."""
def add_tag(self, tag: Union['MISPTag', dict], **kwargs) -> dict:
"""Create new tag."""
def update_tag(self, tag: Union['MISPTag', dict], tag_id: Union[int, str] = None) -> dict:
"""Update existing tag."""
def delete_tag(self, tag_id: Union[int, str]) -> dict:
"""Delete tag."""
def enable_tag(self, tag_id: Union[int, str]) -> dict:
"""Enable tag usage."""
def disable_tag(self, tag_id: Union[int, str]) -> dict:
"""Disable tag usage."""Manage structured classification taxonomies and their hierarchies.
def taxonomies(self, **kwargs) -> list:
"""List available taxonomies."""
def get_taxonomy(self, taxonomy_id: Union[int, str]) -> dict:
"""Get specific taxonomy."""
def enable_taxonomy(self, taxonomy_id: Union[int, str]) -> dict:
"""Enable taxonomy."""
def disable_taxonomy(self, taxonomy_id: Union[int, str]) -> dict:
"""Disable taxonomy."""
def update_taxonomies(self) -> dict:
"""Update taxonomies from repository."""Manage false positive prevention through warning lists.
def warninglists(self, **kwargs) -> list:
"""Get warning lists."""
def get_warninglist(self, warninglist_id: Union[int, str]) -> dict:
"""Get specific warning list."""
def toggle_warninglist(self, warninglist_id: Union[int, str], enabled: bool = None) -> dict:
"""Enable or disable warning list."""
def update_warninglists(self) -> dict:
"""Update warning lists from repository."""from pymisp import PyMISP, MISPTag
misp = PyMISP('https://misp.example.com', 'your-api-key')
# Create custom tag
tag = MISPTag()
tag.name = 'custom:high-priority'
tag.colour = '#ff0000'
tag.exportable = True
misp.add_tag(tag)
# List all tags
tags = misp.tags()
# Apply tag to event
misp.tag(event_id, 'apt')# List taxonomies
taxonomies = misp.taxonomies()
# Enable specific taxonomy
misp.enable_taxonomy('admiralty-scale')
# Get taxonomy details
admiralty = misp.get_taxonomy('admiralty-scale')Install with Tessl CLI
npx tessl i tessl/pypi-pymispdocs
evals
scenario-1
scenario-2
scenario-3
scenario-4
scenario-5
scenario-6
scenario-7
scenario-8
scenario-9
scenario-10