DigitalTwinSocCyberRange / DigitalTwinCyberrangeLinks
DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide training for SOC analysts in a highly realistic scenario making use of the simulation component of the digital twin of an industrial filling plant.
☆11Updated 3 years ago
Alternatives and similar repositories for DigitalTwinCyberrange
Users that are interested in DigitalTwinCyberrange are comparing it to the libraries listed below
Sorting:
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Updated 4 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 5 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆38Updated 2 months ago
- ☆19Updated 5 years ago
- Simulates a compromise in a cloud and container environment☆33Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Updated last year
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆37Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆108Updated last week
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆31Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 4 years ago
- Adversary Emulation Planner☆42Updated last month
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Updated last year
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Updated 4 years ago
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆36Updated 4 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 8 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- Tools used by CSIRT and especially in the scope of CNW☆17Updated 3 weeks ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 4 years ago
- BlackBerry Threat Research & Intelligence☆100Updated 2 years ago
- Open YARA scan- and search engine☆25Updated 11 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆60Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38Updated 8 months ago
- Sandbox samples and monitor them with kunai☆29Updated 7 months ago