mitre / FiGHT
Publicly accessible version of the FiGHT website.
☆12Updated 5 months ago
Alternatives and similar repositories for FiGHT:
Users that are interested in FiGHT are comparing it to the libraries listed below
- A tool for SigOver, signal overshadowing attack on the LTE broadcast signals in physical domain.☆33Updated 2 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- A BurpSuite extension to parse 5GC NF OpenAPI 3.0 files to assess 5G core networks☆73Updated 3 years ago
- Exploring various defensive response options for effectively securing a 5G core-network☆40Updated 9 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- ☆19Updated 4 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated 10 months ago
- A packet capture visualizer for industrial control networks.☆52Updated last year
- ☆28Updated last month
- ☆20Updated 7 years ago
- cgran.org Django website☆11Updated 2 months ago
- ☆21Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Docker Implementation for srsRANProject☆36Updated 2 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated 11 months ago
- hackasat-qualifier-2023☆24Updated last year
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 9 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- Resources and demos from the DEFCON 30 Brief "Space Jam: Exploring Radio Frequency Attacks in Outer Space" by James Pavur☆17Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Implementations of the GEA-1 and GEA-2 (GPRS Encryption Algorithm) stream ciphers in C, Python and Rust.☆17Updated 2 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- Maritime Security overview☆9Updated 4 months ago
- A platform built for easy-to-use automated network traffic analysis☆59Updated 2 years ago
- study material used for the 2018 CISSP exam☆12Updated 5 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 3 years ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆16Updated 4 years ago