cisagov / icsnpp-profinet-io-cm
Zeek Profinet I/O Context Manager Parser - CISA ICSNPP
☆10Updated 3 months ago
Alternatives and similar repositories for icsnpp-profinet-io-cm:
Users that are interested in icsnpp-profinet-io-cm are comparing it to the libraries listed below
- ☆16Updated 10 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆10Updated last year
- Parser for Windows PowerShell script block logs☆13Updated 2 weeks ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆19Updated last month
- An experimental Velociraptor implementation using cloud infrastructure☆23Updated this week
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 8 months ago
- ☆12Updated 2 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Linux #rootkit and #malware revealer☆21Updated 5 months ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month
- ☆15Updated 3 years ago
- ☆17Updated 10 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆14Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- A simple way to exfiltrate data using spotify API☆18Updated this week
- Can you pay the ransom in your country?☆13Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 8 months ago
- VTC - Velociraptor Timeline Creator☆15Updated 8 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆36Updated last month
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- ☆18Updated 5 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆36Updated 4 months ago
- External telegram feeder for AIL framework☆13Updated 2 months ago
- Searching .evtx logs for remote connections☆24Updated last year
- ☆11Updated 4 years ago
- An extension of the sigma standard to include security metrics.☆15Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 2 months ago