Update: Due to unforeseen circumstances the MSTICPy Hack Month has been moved to February 2023. We apologize for any inconvenience this causes but we look forward to working with you on your contributions next month.
MSTICPy is the Microsoft Threat Intelligence Center’s (MSTIC) Open-Source library of Python tools to help security analysts when investigating incidents or hunting for threats. As an Open-Source project MSTICPy is available to everyone via GitHub and is open to contributions to anyone. Since its release MSTICPy has had some great contributions from members of the community. However, we know that whilst many people want to contribute to an Open-Source project it can be a daunting prospect to contribute for the first time and knowing where and how to contribute is key.
In January 2022 we ran our first Hack Month for MSTICPy, helping community members contribute new features and improvements to MSTICPy. During that month we had a range of fantastic contributions from the community, and it has led to ongoing contributions from people who first engaged via the Hack Month. After the first Hack Month’s success we said we would run them again, and so we are back with our January 2023 Hack Month!
As with last year, contributions can be in any form, whether its new features, improvements and fixes to current capabilities, or additional documentation. To help community members know where and how to contribute to MSTICPy we are offering several helping hands:
To learn more about the Hackathon, and to get involved head over to the MSTICPy GitHub page: https://github.com/microsoft/msticpy/discussions/515
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.