DigitalTwinSocCyberRange / DigitalTwinCyberrange
DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide training for SOC analysts in a highly realistic scenario making use of the simulation component of the digital twin of an industrial filling plant.
☆9Updated 2 years ago
Alternatives and similar repositories for DigitalTwinCyberrange:
Users that are interested in DigitalTwinCyberrange are comparing it to the libraries listed below
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 3 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 2 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆33Updated 3 months ago
- Simulates a compromise in a cloud and container environment☆32Updated 3 months ago
- Adversary Emulation Planner☆39Updated 9 months ago
- ☆19Updated last year
- Public Code for ICS Evasion Attack Generation☆42Updated 3 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆23Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated 11 months ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆21Updated 3 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- ☆19Updated 4 years ago
- CyATP: Cybersecurity Awareness Training Platform☆22Updated 3 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆52Updated 7 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 8 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- A packet capture visualizer for industrial control networks.☆53Updated last year
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆23Updated last year
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Automatic detection engineering technical state compliance☆55Updated 9 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆40Updated 8 months ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆73Updated 9 months ago
- A CALDERA plugin☆26Updated 8 months ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated 11 months ago