LiuYuancheng / SIEM_Comm_DashboardLinks
We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to analysis and find the threat event of the nodes.
☆16Updated 7 months ago
Alternatives and similar repositories for SIEM_Comm_Dashboard
Users that are interested in SIEM_Comm_Dashboard are comparing it to the libraries listed below
Sorting:
- This project is used to create a web server running on the orchestrator to provide a Website interface to control and feed back display f…☆12Updated 3 years ago
- ☆13Updated this week
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆12Updated last month
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆40Updated 3 weeks ago
- We want to create a Repo which can provide different Malwares wrote by Python.☆21Updated last week
- We want to build a city simulator OT(Operational Technology) system with two railways and create two kinds of HMI software (Engineer moni…☆56Updated 2 years ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆52Updated last month
- The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize t…☆54Updated last week
- The project main objective is to develop a multiplatform Python program obfuscation tool which can easily safeguard the source code for t…☆14Updated 3 months ago
- This project is aimed to create a trustClient(use TrustZone on ARM) and a server program to verify whether a executable program on Raspbe…☆16Updated last year
- This project will create DJI Tello Drone controller program. It also use the ESP8266 Arduino to read the data from HC-SR04 Ultrasonic Sen…☆11Updated last year
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆59Updated this week
- Beer-ISAC Community Resources☆26Updated 4 years ago
- Augmentation to Machine Readable CTI☆31Updated last month
- ☆69Updated 2 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated 2 months ago
- Turn any blog into structured threat intelligence.☆32Updated this week
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆62Updated last week
- ☆104Updated last week
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 8 months ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆21Updated this week
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆63Updated last year
- Industrial Control Systems Network Protocol Parsers☆173Updated last month
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆29Updated 9 months ago
- Prototype development for Insider Threat Detection and Assessment tools☆8Updated 9 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆29Updated last month
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆96Updated last week
- ☆104Updated last year
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆20Updated last month
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆13Updated last year