nsacyber / ELITEWOLFLinks
OT security monitoring #nsacyber
☆612Updated last year
Alternatives and similar repositories for ELITEWOLF
Users that are interested in ELITEWOLF are comparing it to the libraries listed below
Sorting:
- Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC met…☆364Updated 3 months ago
- Map tracking ransomware, by OCD World Watch team☆480Updated 9 months ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,203Updated last week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆268Updated 5 months ago
- President's Cup Cybersecurity Competition Challenges☆192Updated 3 months ago
- MITRE Caldera™ for OT Plugins & Capabilities☆230Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆430Updated last week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆719Updated 4 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆725Updated 10 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆411Updated 6 months ago
- Practical Windows Forensics Training☆703Updated last year
- Incident Response Methodologies 2022☆1,085Updated 8 months ago
- CLI tools for forensic investigation of Windows artifacts☆347Updated 4 months ago
- A curated list of Awesome Threat Intelligence Blogs☆470Updated 2 weeks ago
- OT Security Lab for ICS networks☆567Updated last week
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,200Updated 3 weeks ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆403Updated last year
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆422Updated last week
- A resource containing all the tools each ransomware gangs uses☆1,291Updated last month
- Gets updates from various clearnet domains and ransomware threat actor domains☆408Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆697Updated 7 months ago
- ☆543Updated 3 months ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆370Updated 3 years ago
- ☆189Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆621Updated 4 months ago
- A curated list of Awesome Threat Intelligence blogs☆88Updated 2 years ago
- ☆63Updated 2 years ago
- My eBook with tips on how to get started in industrial (ICS/OT) cyber security.☆69Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆291Updated last month
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆749Updated last month