dfrws / dfrws2023-challengeLinks
The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically focusing on programmable logic controllers (PLC). This challenge aims to provide deeper insights into ICS network traffic analysis and device memory in a real-world scenario.
☆55Updated last year
Alternatives and similar repositories for dfrws2023-challenge
Users that are interested in dfrws2023-challenge are comparing it to the libraries listed below
Sorting:
- Detection Engineering with YARA☆86Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆86Updated 11 months ago
- A specification and style guide for YARA rules☆63Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆106Updated last year
- Forensic Artifact Collection Tool Matrix☆91Updated last year
- Xavier Framework is a user interface wrapper built on top of the Volatility(c) memory forensics framework.☆46Updated 3 years ago
- ☆67Updated last month
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (ext4, XFS) journals (not systemd-journald logs), gene…☆98Updated this week
- JPCERT/CC public YARA rules repository☆110Updated last month
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- The SOLVE-IT knowledge base for digital forensics☆56Updated last week
- BlackBerry Threat Research & Intelligence☆99Updated 2 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆112Updated last week
- Regexplore is a Volatility plugin designed to mimic the functionality of the Registry Explorer plugins in EZsuite☆17Updated 2 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆32Updated 3 years ago
- A guide on how to write fast and memory friendly YARA rules☆161Updated 10 months ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- macOS Artifacts☆33Updated 9 months ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆65Updated 2 years ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 5 years ago
- The core backend server handling API requests and task management☆54Updated 2 weeks ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- Open Threat Hunting Framework☆121Updated 2 years ago
- Sample evtx files to use for testing hayabusa detection rules☆63Updated last month
- ☆21Updated 2 months ago
- YARA rule analyzer to improve rule quality and performance☆107Updated 8 months ago
- A YARA & Malware Analysis Toolkit written in Rust.☆84Updated 2 months ago