fkie-cad / wattson
A co-simulation framework for reasearching cybersecurity in power grids.
☆20Updated 2 months ago
Alternatives and similar repositories for wattson:
Users that are interested in wattson are comparing it to the libraries listed below
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆17Updated 6 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Repository for LNK stuff☆29Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- ☆25Updated 2 months ago
- ☆18Updated 10 months ago
- A simple way to exfiltrate data using spotify API☆18Updated last week
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- ☆24Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Random scripts for azure stuff☆11Updated 2 years ago
- WMI SA stuffs☆29Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated 9 months ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆20Updated last year
- ☆22Updated last year
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 7 months ago
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated last year
- Collection of generic YARA rules☆15Updated 8 months ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- ☆12Updated 4 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 2 months ago