CRACK-MCR / MaCySTe
Maritime Cyber Security Testbed
☆28Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for MaCySTe
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆63Updated 5 months ago
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆42Updated 6 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆119Updated 2 months ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆11Updated last year
- Cyber Range Automated Construction Kit☆13Updated 4 years ago
- Collection of writeups on ICS/SCADA security.☆156Updated 3 weeks ago
- Advanced OPC-UA framework for vulnerability research & exploitation☆43Updated last year
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆23Updated 7 months ago
- ICS security resources☆91Updated 3 weeks ago
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆37Updated last year
- ☆22Updated last year
- AI-enabled Cybersecurity for Future Smart Environments☆19Updated 3 months ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆58Updated last year
- Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)☆404Updated last year
- Use Z3 to generate strings that match multiple regex | "The plural of regex is regrets"☆26Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆39Updated last month
- Malware datasets tagged by behavior, platform, vulnerability, and packer☆18Updated 8 months ago
- Jupyter Notebooks for the Blue Team☆141Updated last year
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆30Updated 5 months ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆162Updated last year
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆95Updated 8 months ago
- AssemblyLine 4: File triage and malware analysis☆249Updated this week
- DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide …☆7Updated 2 years ago
- ☆42Updated last month
- Operational Technology Cyber Attack Database☆44Updated 2 years ago
- A Low-cost ICS Security Testbed for Education and Research☆104Updated 8 months ago
- MITRE Caldera™ for OT Plugins & Capabilities☆195Updated this week
- Translation of SSH3 project (from commit c39bb79cdce479f6095ab154a32a168e14d73b57) to Python 3 library. Check the original project for mo…☆12Updated 10 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆141Updated 2 months ago
- This is the Network Flow Generator for ICSSIM☆13Updated 3 weeks ago