idaholab / atDiscoLinks
@DisCo is a graph based datastore designed to minimize reverse engineering efforts.
☆12Updated 4 years ago
Alternatives and similar repositories for atDisco
Users that are interested in atDisco are comparing it to the libraries listed below
Sorting:
- WiiBin is a framework to determine architecture of an unknown binary and locate opcode sections within the same binary via supervised mac…☆20Updated last year
- Structured Threat Intelligence Graph☆96Updated 5 months ago
- DNP3 Cyber-attack datasets☆12Updated 8 years ago
- Exploit, Malware and Vulnerability Scoring Application☆14Updated last year
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆15Updated 3 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Updated 2 years ago
- ☆19Updated 4 years ago
- ☆22Updated 3 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆42Updated last year
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆58Updated last year
- This repository shows the prompts we used for each agent in CVE-Genie☆21Updated 3 months ago
- Presentation Slides and Resources☆16Updated last year
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆38Updated 9 months ago
- ☆28Updated 3 months ago
- Damn Vulnerable Chemical Process - Vinyl Acetate Monomer☆22Updated 9 years ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆28Updated 3 years ago
- Augmentation to Machine Readable CTI☆32Updated 2 weeks ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 4 years ago
- Yara rules☆10Updated 5 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆67Updated 4 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- Global Security Database Tools☆44Updated last year
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆12Updated 4 years ago
- OASIS TC Open Repository: GitHub Pages site for STIX and TAXII☆102Updated last week
- ICS TestBed Framework☆69Updated 6 years ago
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Updated last year
- ☆83Updated 2 years ago
- Adversary Emulation Planner☆41Updated last year
- A dataset of software supply chain compromises. Please help us maintain it!☆130Updated 3 years ago
- ☆20Updated 7 years ago