fkie-cad / wattson
A co-simulation framework for reasearching cybersecurity in power grids.
☆19Updated last year
Related projects ⓘ
Alternatives and complementary repositories for wattson
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Tools for offensive security of NetBackup infrastructures☆38Updated last year
- ☆29Updated last year
- An Adaptive Misuse Detection System☆29Updated this week
- ☆17Updated 2 months ago
- ☆17Updated 7 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- An extension of the sigma standard to include security metrics.☆15Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 3 months ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Updated 3 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆25Updated 3 weeks ago
- ☆26Updated 3 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆18Updated last year
- Penguin OS Forensic (or Flight) Recorder☆37Updated 3 months ago
- create a "simulated internet" cyber range environment☆13Updated last month
- A simple way to exfiltrate data using spotify API☆18Updated last month
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆19Updated 10 months ago
- ☆22Updated 2 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆35Updated 10 months ago
- Continuous kerberoast monitor☆43Updated last year
- self-hosted Azure OSINT tool☆22Updated 2 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆27Updated 6 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago