DigitalTwinSocCyberRange / DigitalTwinCyberrangeLinks
DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide training for SOC analysts in a highly realistic scenario making use of the simulation component of the digital twin of an industrial filling plant.
☆10Updated 3 years ago
Alternatives and similar repositories for DigitalTwinCyberrange
Users that are interested in DigitalTwinCyberrange are comparing it to the libraries listed below
Sorting:
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆27Updated 4 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆22Updated 6 months ago
- ☆20Updated last year
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 2 years ago
- ☆19Updated 4 years ago
- ☆22Updated last year
- Public Code for ICS Evasion Attack Generation☆42Updated 4 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆36Updated 6 months ago
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- ☆24Updated last year
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆34Updated last year
- ☆20Updated last year
- ☆28Updated 2 weeks ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 3 months ago
- Industrial Hacking Simulator☆27Updated last month
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- An Adaptive Misuse Detection System☆42Updated 7 months ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated 3 months ago
- Simulates a compromise in a cloud and container environment☆32Updated 6 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated last week
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- A CALDERA plugin☆26Updated 11 months ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago