AlirezaDehlaghi / ICSFlowView external linksLinks
This is the Network Flow Generator for ICSSIM
☆16Aug 28, 2025Updated 5 months ago
Alternatives and similar repositories for ICSFlow
Users that are interested in ICSFlow are comparing it to the libraries listed below
Sorting:
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆16Aug 31, 2023Updated 2 years ago
- This is a boilerplate which has dependencies for pyspark(3.3.0) mongo(>4.x) connectivity☆10May 3, 2024Updated last year
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆29Sep 23, 2025Updated 4 months ago
- ☆10Updated this week
- Documentation and guidance to practice secure coding for various PLC vendors☆41Oct 27, 2023Updated 2 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆36Jul 20, 2024Updated last year
- A Streamlit-based chatbot application using Gemini models for NLP. Features include light/dark mode toggle, model selection (Gemini 1.5 F…☆10May 23, 2024Updated last year
- Base Kafka Producer, consumer, flask api and PySpark Structured streaming Job☆11Oct 20, 2021Updated 4 years ago
- The Westermo test system performance data set☆12Nov 24, 2023Updated 2 years ago
- Mindmap for OWASP Top 10 LLM Application and Relationship between them☆13Dec 11, 2024Updated last year
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆16Dec 8, 2025Updated 2 months ago
- Astrix Security MCP Secret Wrapper☆45Jan 6, 2026Updated last month
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Apr 24, 2023Updated 2 years ago
- The CSET, Malcom, Con-PCA suite of tools☆13Mar 7, 2023Updated 2 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- ☆15Dec 7, 2022Updated 3 years ago
- A simple CLI command that initialises a Kedro project from an existing Python package☆11Aug 23, 2024Updated last year
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated last year
- ☆11Jan 5, 2021Updated 5 years ago
- Manage the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.☆13Jul 16, 2025Updated 6 months ago
- Safety Risk Reliability Model Library☆12Jan 23, 2025Updated last year
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 3 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Jun 21, 2025Updated 7 months ago
- Exchange Online Protection & Microsoft Defender For Office 365 Hardering Tool☆12Jan 14, 2023Updated 3 years ago
- study material used for the 2018 CISSP exam☆12Jun 11, 2018Updated 7 years ago
- This repository contains demo code of basic digital twin system☆15Nov 4, 2020Updated 5 years ago
- SCADA Simulator encompassing things from PLCs to devices such as valves, pumps, tanks, etc. and environmental properties such as water pH…☆16Jun 6, 2018Updated 7 years ago
- automagically fixes simple flake8 lints☆15Jun 26, 2024Updated last year
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Jan 11, 2020Updated 6 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Material for the PySpark course☆14May 16, 2025Updated 8 months ago
- ☆15Dec 4, 2023Updated 2 years ago
- ☆11Mar 14, 2023Updated 2 years ago
- The project brings the power of the Linux kernel tracing to Kubernetes. It leverages existing kernel tracing frameworks such as ftrace, p…☆11Jan 8, 2024Updated 2 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- The Accurics GitHub Action scans Infrastructure as Code files checked into the respository to help ensure that cloud resources are secure…☆15Sep 27, 2023Updated 2 years ago
- Repo for containing and managing office 365 scripts for my customers, techs and others. If you have any questions please feel free to hit…☆11Mar 27, 2022Updated 3 years ago