kkredit / smart-home-threat-modelLinks
A small threat model for a smart home
☆18Updated 6 years ago
Alternatives and similar repositories for smart-home-threat-model
Users that are interested in smart-home-threat-model are comparing it to the libraries listed below
Sorting:
- A website and framework for testing NIDS detection☆308Updated 5 months ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆242Updated last year
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆421Updated last week
- MITRE Caldera™ for OT Plugins & Capabilities☆230Updated 2 weeks ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆178Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆85Updated this week
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆472Updated 6 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆286Updated last year
- Creating a resource to help build and manage an Insider Threat program.☆101Updated 10 months ago
- A curated repository of incident response playbooks☆111Updated 2 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆702Updated last month
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- ☆282Updated 3 months ago
- A collection of sources of documentation and best practices to build and run a SOC☆68Updated 2 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆298Updated last year
- Pwnspoof repository☆264Updated 2 years ago
- Docker image for MISP☆135Updated last week
- This project is a SIEM with SIRP and Threat Intel, all in one.☆464Updated last year
- Repository resource for threat hunter☆158Updated 7 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆88Updated this week
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆430Updated last week
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 3 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆82Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆119Updated last year
- 🏴☠️💰 Another Ransomware gang tracker☆275Updated this week
- IoT Digital Forensics Course with hands-on labs☆230Updated 3 months ago
- firedrill is a malware simulation harness for evaluating your security controls☆195Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆256Updated last year
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆731Updated 10 months ago