fkie-cad / wattson
A co-simulation framework for reasearching cybersecurity in power grids.
☆22Updated 5 months ago
Alternatives and similar repositories for wattson
Users that are interested in wattson are comparing it to the libraries listed below
Sorting:
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- A simple way to exfiltrate data using spotify API☆18Updated last week
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- ☆32Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated last month
- ☆17Updated 9 months ago
- SecurityBsides Roma Conference Repo☆10Updated 2 years ago
- Presentation Slides and Resources☆16Updated 11 months ago
- Documentation and guidance to practice secure coding for various PLC vendors☆36Updated last year
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆16Updated 4 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- ☆18Updated last year
- ☆19Updated last year
- ☆27Updated 5 months ago
- An Adaptive Misuse Detection System☆38Updated 6 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14Updated 2 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- create a "simulated internet" cyber range environment☆16Updated last week
- This is a repo for fetching Applocker event log by parsing the win-event log☆30Updated 2 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- ATLAS - Malware Analysis Description☆21Updated last year
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆12Updated 6 months ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆50Updated 2 months ago