dfrws / dfrws2023-challengeLinks
The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically focusing on programmable logic controllers (PLC). This challenge aims to provide deeper insights into ICS network traffic analysis and device memory in a real-world scenario.
☆54Updated last year
Alternatives and similar repositories for dfrws2023-challenge
Users that are interested in dfrws2023-challenge are comparing it to the libraries listed below
Sorting:
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆105Updated last year
- Detection Engineering with YARA☆87Updated last year
- Forensic Artifact Collection Tool Matrix☆89Updated 10 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 8 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- Xavier Framework is a user interface wrapper built on top of the Volatility(c) memory forensics framework.☆45Updated 3 years ago
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated 3 years ago
- A YARA & Malware Analysis Toolkit written in Rust.☆48Updated last month
- The core backend server handling API requests and task management☆47Updated this week
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆87Updated last week
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- Volatility3 plugins developed and maintained by the community☆59Updated 2 years ago
- Contains compiled binaries of Volatility☆35Updated 3 months ago
- BlackBerry Threat Research & Intelligence☆99Updated last year
- ☆68Updated last month
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆69Updated 2 years ago
- JPCERT/CC public YARA rules repository☆110Updated 9 months ago
- ☆18Updated 9 months ago
- Memory Forensic System on Cloud☆91Updated last year
- A specification and style guide for YARA rules☆54Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated 11 months ago
- ☆94Updated last month
- Repository of tools and resources for analyzing Docker containers☆68Updated last year
- YARA rule analyzer to improve rule quality and performance☆103Updated 5 months ago
- Open Threat Hunting Framework☆118Updated 2 years ago
- Sample evtx files to use for testing hayabusa detection rules☆60Updated 10 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆58Updated last month
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆108Updated this week