Universal CPS Environment for Federation
☆19Oct 4, 2022Updated 3 years ago
Alternatives and similar repositories for ucef
Users that are interested in ucef are comparing it to the libraries listed below
Sorting:
- System Validation Platform☆12Sep 18, 2025Updated 5 months ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated 2 months ago
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- A SCADA system that uses prime for intrusion tolerance. Using PVBrowser as an HMI☆10May 27, 2015Updated 10 years ago
- ☆14Nov 11, 2014Updated 11 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- MIT IAP 2019 Computational Law Course☆14Jul 10, 2019Updated 6 years ago
- Summation of the OWASP Testing Guide for reference☆10Jun 19, 2017Updated 8 years ago
- ☆13May 30, 2017Updated 8 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 3 months ago
- React component for rendering RDF graphs and datasets using n3.js and cytoscape.js☆10Nov 8, 2021Updated 4 years ago
- Python interpreter for SEL (Schweitzer Engineering Laboratories) CEV (Compressed EVent record) files.☆13Jan 16, 2023Updated 3 years ago
- ☆14Feb 16, 2023Updated 3 years ago
- Use your iPad as a Goban☆30Aug 4, 2010Updated 15 years ago
- A workspace for learning computer science and software engineering topics☆13Oct 31, 2018Updated 7 years ago
- 🐲 Stanford CS234 : Reinforcement Learning☆12Jan 14, 2019Updated 7 years ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- 📻 A Mand Mobile project example for Nuxt☆11Jan 4, 2023Updated 3 years ago
- ☆11May 6, 2025Updated 9 months ago
- Easily set Mac Retina display to higher unsupported resolutions☆12Feb 5, 2023Updated 3 years ago
- GUI and command line application for downloading large data volumes from PI Historian☆11Nov 8, 2023Updated 2 years ago
- SVP library that enables communication with energy lab equipment.☆13Sep 18, 2025Updated 5 months ago
- Repository for the W3C Threat Modeling Community Group (TMCG)☆21Jan 6, 2026Updated last month
- Material from ICS Village talk at DEFCON 25☆12Jul 30, 2018Updated 7 years ago
- Wireshark dissector for wirelessHART☆13Aug 2, 2017Updated 8 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- ☆12Jun 16, 2021Updated 4 years ago
- An AI-based solver for the popular mobile game Flow Free☆11Oct 11, 2020Updated 5 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- Simple packet dissector that detects anomalous DNP3 traffic by analysing its parameters☆15Jan 12, 2016Updated 10 years ago
- CDS Threat Modeling Tool MVP☆14Updated this week
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 7 months ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- Landing a Spaceship using Upside-Down Reinforcement Learning (a.k.a ⅂ꓤ)☆13Oct 25, 2023Updated 2 years ago
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 5 years ago