usnistgov / ucefLinks
Universal CPS Environment for Federation
☆19Updated 3 years ago
Alternatives and similar repositories for ucef
Users that are interested in ucef are comparing it to the libraries listed below
Sorting:
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 3 years ago
- ☆14Updated 5 years ago
- ☆27Updated 2 years ago
- Material from ICS Village talk at DEFCON 25☆12Updated 7 years ago
- Damn Vulnerable Chemical Process - Vinyl Acetate Monomer☆22Updated 10 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- Scan pypi for typosquatting☆38Updated 3 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated this week
- DNP3 Cyber-attack datasets☆15Updated 8 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Updated 4 years ago
- Damn Vulnerable Chemical Process - Tennessee Eastman☆80Updated 10 years ago
- MiniCPS: a framework for Cyber-Physical Systems real-time simulation, built on top of mininet☆187Updated 4 months ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 8 years ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Updated 5 years ago
- FACT analysis plug-in that maps software version to cves☆13Updated 6 years ago
- ☆31Updated 8 years ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆59Updated last year
- Security Harness Engineering for Robust Program Analysis☆111Updated 2 weeks ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 10 years ago
- ICS TestBed Framework☆69Updated 7 years ago
- Embedded AppSec Best Practices☆44Updated 3 months ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆67Updated 4 years ago
- A Java library for parsing and programmatically using threat models☆82Updated 2 years ago
- CANBus protection used to isolate third party systems requiring OBDII access.☆19Updated 10 years ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆30Updated 3 years ago
- VulZoo: A Comprehensive Vulnerability Intelligence Dataset | ASE 2024 Demo☆66Updated 10 months ago
- ☆30Updated 4 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- A tool that can be used to learn state machines from implementations.☆67Updated last month
- ☆32Updated last month