DigitalTwinSocCyberRange / DigitalTwinCyberrangeLinks
DigitalTwinSocCyberrange is a research project by the University of Regensburg and the Ionian University. This prototype aims to provide training for SOC analysts in a highly realistic scenario making use of the simulation component of the digital twin of an industrial filling plant.
☆11Updated 3 years ago
Alternatives and similar repositories for DigitalTwinCyberrange
Users that are interested in DigitalTwinCyberrange are comparing it to the libraries listed below
Sorting:
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆32Updated 4 years ago
- ☆19Updated 5 years ago
- Adversary Emulation Planner☆42Updated last year
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆37Updated last year
- Simulates a compromise in a cloud and container environment☆33Updated 11 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated this week
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- ☆30Updated 2 months ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆17Updated this week
- Graph Representation of MITRE ATT&CK's CTI data☆50Updated 6 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆21Updated 4 years ago
- A document tagging library☆31Updated 8 months ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 3 years ago
- Sandbox samples and monitor them with kunai☆29Updated 5 months ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 8 months ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆29Updated last year
- ☆20Updated 2 years ago
- Public Code for ICS Evasion Attack Generation☆44Updated 4 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Updated 2 years ago
- ☆25Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 10 months ago
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- BlackBerry Threat Research & Intelligence☆99Updated 2 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆32Updated last year
- An Adaptive Misuse Detection System☆46Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated 2 years ago