Cisco-Talos / badgerboardLinks
☆16Updated last year
Alternatives and similar repositories for badgerboard
Users that are interested in badgerboard are comparing it to the libraries listed below
Sorting:
- ☆72Updated 4 months ago
- A packet capture visualizer for industrial control networks.☆55Updated last year
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated 4 months ago
- Remote access and Antivirus Logging Database☆42Updated last year
- Scripts and other tools to helps parse data or gather information☆66Updated 2 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 3 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 5 months ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13Updated 2 months ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆84Updated last week
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- ☆68Updated this week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 3 weeks ago
- Operational Technology Cyber Attack Database☆49Updated 3 years ago
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆13Updated last month
- Bring Your Own Mitre Att&ck © Matrix !☆13Updated last year
- Industrial Control Systems Network Protocol Parsers☆177Updated last week
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆77Updated last week
- Dissect triage script for Citrix NetScaler devices☆35Updated last week
- Scripts and lists to help generate YARA friendly string mutations☆21Updated 2 years ago
- EtherNet/IP & CIP Stack Detector☆47Updated 3 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆47Updated 2 months ago
- Digital Forensics Artifacts Knowledge Base☆84Updated last year
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆51Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆80Updated 2 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆14Updated last month
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆104Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆92Updated last week
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆108Updated 9 months ago
- pySigma Splunk backend☆41Updated 2 months ago