usnistgov / ucef
Universal CPS Environment for Federation
☆18Updated last year
Related projects: ⓘ
- DARPA's Cyber Assured Systems Engineering (CASE) project named Verification Evidence and Resilient Design in Anticipation of Cybersecurit…☆40Updated 3 weeks ago
- ☆12Updated 3 years ago
- ☆24Updated 2 years ago
- Public Code for ICS Evasion Attack Generation☆39Updated 3 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆31Updated 4 months ago
- ICS TestBed Framework☆60Updated 5 years ago
- DARPA CASE program☆13Updated 2 years ago
- Legacy firmware for ICS and other devices.☆11Updated 3 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆20Updated 7 years ago
- A tool for reverse engineering industrial control systems binaries.☆155Updated 6 months ago
- Python / Scapy tool to analyze and interact with IEC 61850 Goose traffic☆31Updated 2 years ago
- Damn Vulnerable Chemical Process - Vinyl Acetate Monomer☆21Updated 8 years ago
- Zeek S7comm, S7comm-plus, and COTP Parser - CISA ICSNPP☆19Updated 2 months ago
- ☆47Updated 6 years ago
- OWASP Ontology-driven Threat Modelling framework☆35Updated last year
- ☆18Updated 3 years ago
- Tools demonstrated at DEF CON 26 talk "Hacking PLCs and Causing Havoc on Critical Infrastructures"☆40Updated 6 years ago
- ☆20Updated 3 months ago
- MAS - Modbus Attack Scripts☆10Updated 6 years ago
- Structured Threat Intelligence Graph☆83Updated last week
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 6 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to sear…☆64Updated 3 years ago
- Open Source AADL2 Tool Environment☆36Updated last month
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆38Updated 3 months ago
- Development of the NIST vulnerability data ontology (Vulntology).☆36Updated 3 months ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 8 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆69Updated this week
- Material from ICS Village talk at DEFCON 25☆10Updated 6 years ago
- The SCADA Simulator is a configurable system that presents itself as a SCADA system within an exercise environment. It has a web-accessib…☆108Updated 3 years ago
- Scan pypi for typosquatting☆36Updated last year