LiuYuancheng / SIEM_Comm_DashboardLinks
We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to analysis and find the threat event of the nodes.
☆16Updated last year
Alternatives and similar repositories for SIEM_Comm_Dashboard
Users that are interested in SIEM_Comm_Dashboard are comparing it to the libraries listed below
Sorting:
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆14Updated 6 months ago
- ☆14Updated 2 weeks ago
- This project is used to create a web server running on the orchestrator to provide a Website interface to control and feed back display f…☆12Updated 3 years ago
- We want to create a Repo which can provide different Malwares wrote by Python.☆26Updated 6 months ago
- We want to build a city simulator OT(Operational Technology) system with two railways and create two kinds of HMI software (Engineer moni…☆81Updated 2 years ago
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆50Updated last week
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆67Updated 6 months ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆56Updated 7 months ago
- The project main objective is to develop a multiplatform Python program obfuscation tool which can easily safeguard the source code for t…☆14Updated 9 months ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆26Updated 2 years ago
- 12 Weeks, 24 Lessons, IoT for All!☆21Updated last year
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆103Updated 6 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆83Updated this week
- Automating Security Detection Engineering, published by Packt☆65Updated last year
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23Updated last week
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆51Updated 6 months ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆88Updated this week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆221Updated last year
- this tutorial contain a simple explanation for FreeRTOS using neculo-32f303RE☆10Updated 2 years ago
- This is an article preview component from frontend mentor challenge☆22Updated last year
- ☆11Updated last year
- My eBook with tips on how to get started in industrial (ICS/OT) cyber security.☆67Updated 2 years ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆15Updated last week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆166Updated last month
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆51Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆67Updated last year
- A python machine learning library☆12Updated last year
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Updated last year
- Repo of KC7 challenge scenarios☆26Updated 2 months ago
- Industrial Control Systems Network Protocol Parsers☆182Updated 2 months ago