dfrws / dfrws2023-challengeLinks
The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically focusing on programmable logic controllers (PLC). This challenge aims to provide deeper insights into ICS network traffic analysis and device memory in a real-world scenario.
☆54Updated last year
Alternatives and similar repositories for dfrws2023-challenge
Users that are interested in dfrws2023-challenge are comparing it to the libraries listed below
Sorting:
- Rules shared by the community from 100 Days of YARA 2024☆86Updated 10 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆107Updated last year
- Detection Engineering with YARA☆87Updated last year
- Xavier Framework is a user interface wrapper built on top of the Volatility(c) memory forensics framework.☆45Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆99Updated 2 years ago
- A specification and style guide for YARA rules☆60Updated last year
- ☆68Updated 2 weeks ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆33Updated 3 weeks ago
- A YARA & Malware Analysis Toolkit written in Rust.☆56Updated last month
- Forensic Artifact Collection Tool Matrix☆91Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated 3 years ago
- JPCERT/CC public YARA rules repository☆110Updated this week
- Open Threat Hunting Framework☆121Updated 2 years ago
- The core backend server handling API requests and task management☆49Updated 3 weeks ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆91Updated 2 weeks ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Updated last month
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Augmentation to Machine Readable CTI☆37Updated 2 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆125Updated last year
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆112Updated last week
- ☆99Updated 2 weeks ago
- YARA rule analyzer to improve rule quality and performance☆106Updated 7 months ago
- The Threat Actor Profile Guide for CTI Analysts☆115Updated 2 years ago
- ☆18Updated 11 months ago
- Volatility3 plugins developed and maintained by the community☆60Updated 2 years ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆61Updated 6 months ago
- A CALDERA plugin☆26Updated last week
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year