mitre / emb3d
☆24Updated last month
Alternatives and similar repositories for emb3d:
Users that are interested in emb3d are comparing it to the libraries listed below
- Advanced OPC-UA framework for vulnerability research & exploitation☆49Updated last year
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆72Updated 8 months ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆33Updated 3 months ago
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- The DFRWS 2023 challenge (The Troubled Elevator) takes a deep dive into the domain of Industrial Control Systems (ICS), specifically foc…☆46Updated 10 months ago
- ☆13Updated last year
- Code for shelLM tool☆51Updated last month
- ☆16Updated 8 months ago
- ☆91Updated 3 years ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated 4 months ago
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆55Updated last year
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- ☆16Updated 2 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆51Updated last year
- ☆19Updated 4 years ago
- ICS TestBed Framework☆65Updated 6 years ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆62Updated this week
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆13Updated 5 years ago
- ☆28Updated last month
- Automated Yara Rule generation using Biclustering☆65Updated 3 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- Zeek Ethercat Parser - CISA ICSNPP☆13Updated 5 months ago
- Augmentation to Machine Readable CTI☆29Updated this week
- ☆27Updated 3 years ago
- MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning☆39Updated 3 weeks ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆110Updated this week
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆61Updated 4 months ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆15Updated last year