mikesiko / HELLOCUCLASS
☆9Updated 4 years ago
Alternatives and similar repositories for HELLOCUCLASS:
Users that are interested in HELLOCUCLASS are comparing it to the libraries listed below
- A Microsoft Threat Modelling tool template for ICS threat modelling☆10Updated 4 years ago
- ☆21Updated 3 years ago
- A tool for processing a lot of pcaps using tshark☆154Updated last year
- Repo containing links to all CTF Challenges used in the 2015 MITRE CTF.☆10Updated 8 years ago
- Cloned from now gone Digitalbond page.☆15Updated 8 years ago
- Zeek network security monitor plugin that enables parsing of the BACnet standard building controls protocol☆31Updated 7 months ago
- ☆10Updated 7 years ago
- The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.☆25Updated 6 years ago
- ☆28Updated 7 years ago
- Converts serial IP data, typically collected from Industrial Control System devices, to the more commonly used Packet Capture (PCAP) form…☆75Updated 7 years ago
- AlienVault Open Threat Exchange App For Splunk☆9Updated 10 years ago
- Published problems and writeups from the Information & Systems Security Society's CTF contests☆5Updated 3 months ago
- Zeek Auxiliary Programs☆27Updated last month
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- ☆14Updated this week
- Experimental CPSA -- the Cryptographic Protocol Shapes Analyzer experimental version☆14Updated 2 weeks ago
- Vulnerability scanner for OFX servers☆31Updated last year
- ☆75Updated 3 years ago
- Zeek BACnet Parser - CISA ICSNPP☆16Updated 6 months ago
- OWASP Foundation Web Respository☆17Updated last year
- Repo for MIRR Workshop Heroku app☆51Updated 4 years ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆46Updated 7 months ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41Updated 7 months ago
- Landing page for MAEC docs☆20Updated 2 years ago
- Files compiled from the Logica breach investigation materials☆41Updated 6 years ago
- Structured Threat Intelligence Graph☆89Updated this week
- wireless client identification☆18Updated 10 years ago
- Crack passwords using Terraform and AWS☆42Updated 5 years ago
- Log4j Exploit Detection Logic for Zeek☆19Updated 8 months ago