fkie-cad / wattson
A co-simulation framework for reasearching cybersecurity in power grids.
☆22Updated 4 months ago
Alternatives and similar repositories for wattson:
Users that are interested in wattson are comparing it to the libraries listed below
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A simple way to exfiltrate data using spotify API☆18Updated last month
- ☆24Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- ☆12Updated 4 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆27Updated 4 months ago
- WMI SA stuffs☆29Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- ☆12Updated 2 years ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated last month
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ☆18Updated last year
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆16Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Parser for Windows PowerShell script block logs☆13Updated 3 months ago
- ☆28Updated last year
- Open YARA scan- and search engine☆22Updated 2 months ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 10 months ago
- Presentation Slides and Resources☆16Updated 10 months ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Kibana app for RedELK☆17Updated 2 years ago