MSTICPy Hackathon - January 2022

Published Nov 30 2021 11:13 AM 2,325 Views
Microsoft

Hackathon Banner.png

 

MSTICPy is the Microsoft Threat Intelligence Center’s (MSTIC) Open-Source library of Python tools to help security analysts when investigating incidents or hunting for threats. As an Open-Source project MSTICPy is available to everyone via GitHub and is open to contributions to anyone. Since its release MSTICPy has had some great contributions from members of the community, both in the form of fixes and improvements as well as new features such as the recently added RiskIQ integration. However, we know that whilst many people want to contribute to an Open-Source project it can be a daunting prospect to contribute for the first time and knowing where and how to contribute is key.

 

MSTIC is a big believer in the power of community to help improve security for all so to help others in the community contribute to MSTICPy in January 2022 we are running the first MSTICPy Hackathon. During this month the MSTICPy team are encouraging anyone who wants to contribute to MSTICPy to get involved. Contributions can be in any form, whether its new features, improvements and fixes to current capabilities, or additional documentation.

 

To help community members know where and how to contribute to MSTICPy we are offering a number of helping hands:

  1. We will be publishing a list of contribution ideas via GitHub. These will cover a range of items, differing in complexity and effort required – from items ideal for first time contributors up to complex items for Python exports. You can find these on the Issues page:  https://github.com/microsoft/msticpy/issues
  2. We will be running drop-in hours where members of the community can drop in and ask the MSTICPy team questions, or get support on their contributions. We will be posting details of these drop-in sessions at the start of January.
  3. For those that can’t make the drop-in sessions we are going to be offering enhanced support for contributors via email at msticpy@microsoft.com. Whilst we offer support via this method at all times we are a small team so during January we are going to be upping our focus on this to ensure we get back to be as quickly as possible.
  4. For those community members that make a special contribution we are going to be offering some exclusive prizes as a way to say thanks!

 

To learn more about the Hackathon, and to get involved head over to the MSTICPy GitHub page: https://github.com/microsoft/msticpy/wiki/MSTICPy-January-2022-Hackathon

%3CLINGO-SUB%20id%3D%22lingo-sub-3019705%22%20slang%3D%22en-US%22%3EMSTICPy%20Hackathon%20-%20January%202022%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3019705%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Hackathon%20Banner.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F330538iE56905C1481518D3%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Hackathon%20Banner.png%22%20alt%3D%22Hackathon%20Banner.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMSTICPy%20is%20the%20Microsoft%20Threat%20Intelligence%20Center%E2%80%99s%20(MSTIC)%20Open-Source%20library%20of%20Python%20tools%20to%20help%20security%20analysts%20when%20investigating%20incidents%20or%20hunting%20for%20threats.%20As%20an%20Open-Source%20project%20MSTICPy%20is%20available%20to%20everyone%20via%20GitHub%20and%20is%20open%20to%20contributions%20to%20anyone.%20Since%20its%20release%20MSTICPy%20has%20had%20some%20great%20contributions%20from%20members%20of%20the%20community%2C%20both%20in%20the%20form%20of%20fixes%20and%20improvements%20as%20well%20as%20new%20features%20such%20as%20the%20recently%20added%20RiskIQ%20integration.%20However%2C%20we%20know%20that%20whilst%20many%20people%20want%20to%20contribute%20to%20an%20Open-Source%20project%20it%20can%20be%20a%20daunting%20prospect%20to%20contribute%20for%20the%20first%20time%20and%20knowing%20where%20and%20how%20to%20contribute%20is%20key.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fmedium.com%2F%40johnlatwc%2Fthe-githubification-of-infosec-afbdbfaad1d1%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMSTIC%20is%20a%20big%20believer%20in%20the%20power%20of%20community%20to%20help%20improve%20security%3C%2FA%3E%20for%20all%20so%20to%20help%20others%20in%20the%20community%20contribute%20to%20MSTICPy%20in%20January%202022%20we%20are%20running%20the%20first%20MSTICPy%20Hackathon.%20During%20this%20month%20the%20MSTICPy%20team%20are%20encouraging%20anyone%20who%20wants%20to%20contribute%20to%20MSTICPy%20to%20get%20involved.%20Contributions%20can%20be%20in%20any%20form%2C%20whether%20its%20new%20features%2C%20improvements%20and%20fixes%20to%20current%20capabilities%2C%20or%20additional%20documentation.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20help%20community%20members%20know%20where%20and%20how%20to%20contribute%20to%20MSTICPy%20we%20are%20offering%20a%20number%20of%20helping%20hands%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EWe%20will%20be%20publishing%20a%20list%20of%20contribution%20ideas%20via%20GitHub.%20These%20will%20cover%20a%20range%20of%20items%2C%20differing%20in%20complexity%20and%20effort%20required%20%E2%80%93%20from%20items%20ideal%20for%20first%20time%20contributors%20up%20to%20complex%20items%20for%20Python%20exports.%20You%20can%20find%20these%20on%20the%20Issues%20page%3A%20%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fmicrosoft%2Fmsticpy%2Fissues%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgithub.com%2Fmicrosoft%2Fmsticpy%2Fissues%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3EWe%20will%20be%20running%20drop-in%20hours%20where%20members%20of%20the%20community%20can%20drop%20in%20and%20ask%20the%20MSTICPy%20team%20questions%2C%20or%20get%20support%20on%20their%20contributions.%20We%20will%20be%20posting%20details%20of%20these%20drop-in%20sessions%20at%20the%20start%20of%20January.%3C%2FLI%3E%0A%3CLI%3EFor%20those%20that%20can%E2%80%99t%20make%20the%20drop-in%20sessions%20we%20are%20going%20to%20be%20offering%20enhanced%20support%20for%20contributors%20via%20email%20at%20%3CA%20href%3D%22mailto%3Amsticpy%40microsoft.com%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Emsticpy%40microsoft.com%3C%2FA%3E.%20Whilst%20we%20offer%20support%20via%20this%20method%20at%20all%20times%20we%20are%20a%20small%20team%20so%20during%20January%20we%20are%20going%20to%20be%20upping%20our%20focus%20on%20this%20to%20ensure%20we%20get%20back%20to%20be%20as%20quickly%20as%20possible.%3C%2FLI%3E%0A%3CLI%3EFor%20those%20community%20members%20that%20make%20a%20special%20contribution%20we%20are%20going%20to%20be%20offering%20some%20exclusive%20prizes%20as%20a%20way%20to%20say%20thanks!%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20learn%20more%20about%20the%20Hackathon%2C%20and%20to%20get%20involved%20head%20over%20to%20the%20MSTICPy%20GitHub%20page%3A%20%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fmicrosoft%2Fmsticpy%2Fwiki%2FMSTICPy-January-2022-Hackathon%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgithub.com%2Fmicrosoft%2Fmsticpy%2Fwiki%2FMSTICPy-January-2022-Hackathon%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-3019705%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fmedium.com%2F%40johnlatwc%2Fthe-githubification-of-infosec-afbdbfaad1d1%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMSTIC%20is%20a%20big%20believer%20in%20the%20power%20of%20community%20to%20help%20improve%20security%3C%2FA%3E%20for%20all%20so%20to%20help%20others%20in%20the%20community%20contribute%20to%20MSTICPy%20in%20January%202022%20we%20are%20running%20the%20first%20MSTICPy%20Hackathon.%20During%20this%20month%20the%20MSTICPy%20team%20are%20encouraging%20anyone%20who%20wants%20to%20contribute%20to%20MSTICPy%20to%20get%20involved.%20Contributions%20can%20be%20in%20any%20form%2C%20whether%20its%20new%20features%2C%20improvements%20and%20fixes%20to%20current%20capabilities%2C%20or%20additional%20documentation.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Hackathon%20Banner.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F330537i8744480E0B4499F2%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Hackathon%20Banner.png%22%20alt%3D%22Hackathon%20Banner.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Co-Authors
Version history
Last update:
‎Nov 30 2021 11:13 AM
Updated by: