@DisCo: Binary-Level Vulnerability Detection
Annotated Translated Disassembled Code (@DisCo)
AHA: Infrastructure Decision Support for Disaster Management
All Hazards Analysis Core (AHA)
ATIS: Malware Analysis and STIX Data Transformation
Any Threat Intelligence to STIX (ATIS)
ATTAR: Remote Testing Framework for Security Analysis and Protection
A remote testing and validation tool using SSH for automated software testing, particularly effective in cybersecurity applications
Automated NVD Vulnerability Search to STIX Bundle Translator
Convert National Vulnerability Database searches into structured STIX data for enhanced security intelligence and analysis.
CATCH: Comprehensive Telemetry Analysis and Threat Intelligence Framework for Advanced Security
Collect, analyze, and report on anomalous telemetry data with the CATCH CLI and CGUI, integrating Neo4j and STIX 2.1 for standardized, actionable intelligence.
Cerberus
Safety Instrumented System (SIS) for Extreme Fast Charging (XFC) Infrastructure - Analysis Software
CIEMAT: Cyber-Informed Engineering Microgrid Analysis Tool
CIEMAT helps microgrid designers and operators build stronger, more resilient systems by integrating engineering and cybersecurity measures to minimize the impact of cyber attacks.
Cirrus: Cloud Feasibility Assessment Tool for Grid Professionals
Cirrus provides grid and utility professionals with strategic guidance for cloud integration, enhancing operational resilience and efficiency through tailored feasibility assessments and resource planning.
CSET: Cyber Security Evaluation Tool
A desktop or web-based tool guiding asset owners through evaluating control system and IT security practices against industry standards.
CyOTE: Detecting Cyber Attacks in Operational Technology Environments
CyOTE Research Tool Library (CRTL)
CyStAR: Cyber-Physical Threat Detection and Asset Monitoring
Cyber State Awareness for Resilience (CyStAR)
DaRT: Malicious Code Disassembly for Risk-Free Transport
DaRT (Disassembly and Reassembly for Transport)
DISCOverflow: Project Code Structure Visualization Tool
Automatically disassembles project code data into a graph database for efficient and secure code analysis.
EFAC: Infrastructure Analysis for Enhanced Disaster Resilience
Essential Function Analysis Capability (EFAC)
EMV: Exploit, Malware, and Vulnerability Scoring GUI
A customizable application that allows users to create and apply their own scoring schema to cyber issues, interfacing with STIX objects and supporting export functions.
ESE: Comprehensive STIX1-to-STIX2 Conversion Tool
Enhanced STIX Elevator (ESE)
HPCACT-2022: Video Annotation for Anomaly Detection in Data Centers
Anomalous and normal High Performance Computing datacenter activities
ICSNPP: Industrial Control System Network Protocol Parsers
A series of industrial control system protocol parsers developed by INL for the Zeek network security monitoring framework to enhance incident response capabilities.
Infrastructure eXpression: Discovery Tools
Automates the collection and conversion of network vulnerabilities into STIX format, streamlining vulnerability management and sharing.
Malcolm: Network Traffic Analysis
Network traffic analysis suite offering easy upload, powerful traffic analysis, and streamlined deployment for security operations.
MaSDE: Real-Time Dynamic Estimation for a Resilient Power Grid
Master State Distributed Estimator (MaSDE)
MASFIC: Streamlined Contingency Analysis for Power Utilities
MASFIC (MASTERRI Automated SAPHIRE File Intermediary Converter) is a powerful software application designed to streamline contingency analysis and risk assessment in power grids.
MaSTI: Network Monitoring for Enhanced Control System Protection
Master State Threat Identifier (MaSTI)
NAVV Tool: Network Architecture Verification & Validation Tool
Automates network traffic analysis using Zeek IDS logs, generating an Excel summary for easy data sorting and analysis.
OpDefender: Real-Time Network Traffic Analysis
A cybersecurity solution for control system networks, featuring smart switches and a network HMI for real-time attack prevention and network traffic control.
PacketSight: Mitigating Unusual Network Packets
This software identifies, examines, and mitigates unusual network packets using a multi-dimensional latent space representation.
PANDA: Predictive Automation of Novel Defect Anomalies
Automate the identification and segmentation of dislocation-type defects in irradiated materials using a YOLOv8-based software, capable of detecting both dislocation lines and loops—even in high-noise micrographs—improving accuracy and efficiency in post-irradiation materials analysis.
Parsnip Parser Creation Application:
Parsnip aims to automate 90% of the repetitive tasks involved in parser development
Polyglot Framework: Cross-Platform Tool Development
Polyglot is a framework that simplifies the process of creating or modifying tools for a wide range of devices and operating systems. It is especially useful for embedded, esoteric, or old targets that lack easy and consistent solutions.
PowDDeR v2: Power Distribution Designing for Resilience Application
Updated software tool for power distribution design, analyzing system resilience to disturbances in real and reactive power.
PowDDeR: Power Distribution Designing for Resilience Application
Measures power system resilience by analyzing responses to disturbances, such as natural or human-caused ones
Scramble
Simulated control and cybersecurity testing tool for microgrid implementations, providing realistic response analysis.
Sentinel: Low-Power Semi-Supervised Machine-Learning-Based Intrusion Detection for IoT Networks
Efficient anomaly and intrusion detection tailored for IoT and critical infrastructure networks with low power requirements.
SPEMMCRA: Control Strategy Testing for Microgrid Implementations
Simulated control and cybersecurity testing tool for microgrid implementations, providing realistic response analysis.
STAR: Structured Threat Automated Response
Automates response actions for cybersecurity threats by executing STIX Course of Action objects in Python.
STIG: Graph-Based Threat Intelligence and Response System
Structured Threat Intelligence Graph (STIG)
STIXEnforcer: Advanced STIX 2.1 Data Enrichment and Error Correction Tool
Structured Threat Information Expression Style Enforcer
STOAT: Automated Scoring Tool for Software Weaknesses
Scoring Threat Object Analysis Tool (STOAT)
STOTS: Network Threat Analysis and Visualization Suite
Structured Threat Observation Tool Set (STOTS)
TOPGEAR: Technology, Organization, and Person of interest Graph Extraction, Analysis, and Reporting
Adversarial Socio-Technical Network Analysis (ASTNA) is a data processing pipeline for extracting a knowledge graph from SEC Documents to enable robust socio-technical analysis of critical infrastructure influence.
Vendor 0: FPE Library for Structured File Encryption
Encryption library for structured files like JSON, addressing the need for secure data handling in sensitive utility information management.
WiiBin: Machine Learning Binary Analysis for Reverse Engineering
What Is It Binary (WiiBin)