fkie-cad / wattsonLinks
A co-simulation framework for reasearching cybersecurity in power grids.
☆23Updated 7 months ago
Alternatives and similar repositories for wattson
Users that are interested in wattson are comparing it to the libraries listed below
Sorting:
- ☆18Updated 2 weeks ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆57Updated last month
- ☆20Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 5 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated 3 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 3 weeks ago
- Hashes of infamous malware☆26Updated 2 years ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated 3 months ago
- C2 Active Scanner☆59Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated 2 years ago
- ☆15Updated 3 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- A simple way to exfiltrate data using spotify API☆18Updated 3 weeks ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 5 months ago
- Linux #rootkit and #malware revealer☆26Updated 11 months ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- ☆24Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- An Adaptive Misuse Detection System☆42Updated 8 months ago
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated 6 months ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year