SPKavati / Threat-Intelligence-Machine-Learning-Approach-to-ICS-Security-
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, comp…
☆18Updated 6 years ago
Related projects: ⓘ
- Utility for parsing Bro log files into CSV or JSON format☆41Updated last year
- Graph Representation of MITRE ATT&CK's CTI data☆47Updated 4 years ago
- Presentation Slides and Video links☆31Updated 2 years ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆44Updated 3 months ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆63Updated 4 months ago
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 2 years ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆24Updated 3 months ago
- Detecting DNS Spoofing, DNS Tunneling, DNS Exfiltration☆35Updated 8 years ago
- Home to the ActorTrackr source code☆27Updated 7 years ago
- Python API for the CVSS v3☆56Updated 3 years ago
- ☆27Updated 7 years ago
- Searches for Insider Threat Hunting☆30Updated 5 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆20Updated 3 years ago
- Cyber Threat Intelligence - Toolbox☆50Updated 5 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 5 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆24Updated 3 years ago
- List of default passwords for Industrial Control Systems☆68Updated 7 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- For storing of the volumes☆3Updated 4 years ago
- Build your own threat hunting maturity model☆12Updated 6 years ago
- IOCs for CRASHOVERRIDE malware framework☆24Updated 7 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Repository of yara rules☆57Updated last year
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆53Updated 6 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆25Updated 7 years ago
- ☆21Updated 2 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago