nsacyber / ELITEWOLFLinks
OT security monitoring #nsacyber
☆611Updated last year
Alternatives and similar repositories for ELITEWOLF
Users that are interested in ELITEWOLF are comparing it to the libraries listed below
Sorting:
- Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC met…☆361Updated 2 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆268Updated 5 months ago
- Map tracking ransomware, by OCD World Watch team☆479Updated 8 months ago
- MITRE Caldera™ for OT Plugins & Capabilities☆230Updated this week
- OT Security Lab for ICS networks☆553Updated last week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆722Updated 9 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆408Updated 6 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆414Updated last week
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,203Updated last month
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆716Updated 3 months ago
- Practical Windows Forensics Training☆698Updated last year
- CLI tools for forensic investigation of Windows artifacts☆347Updated 4 months ago
- Incident Response Methodologies 2022☆1,082Updated 7 months ago
- President's Cup Cybersecurity Competition Challenges☆186Updated 2 months ago
- ☆52Updated 2 years ago
- ☆541Updated 2 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,192Updated last week
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆406Updated this week
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆696Updated 7 months ago
- A resource containing all the tools each ransomware gangs uses☆1,280Updated last month
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆402Updated last year
- Awesome Incident Response☆283Updated last month
- Awesome list of keywords and artifacts for Threat Hunting sessions☆615Updated 3 months ago
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆960Updated 2 weeks ago
- ☆188Updated last year
- Security Operations Chef☆48Updated this week
- 🏴☠️💰 Another Ransomware gang tracker☆267Updated 2 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Updated last week
- ☆63Updated 2 years ago
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆248Updated this week