AlirezaDehlaghi / ICSFlow
This is the Network Flow Generator for ICSSIM
☆13Updated last week
Alternatives and similar repositories for ICSFlow:
Users that are interested in ICSFlow are comparing it to the libraries listed below
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆12Updated 2 weeks ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆29Updated last month
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆72Updated 9 months ago
- An Adaptive Misuse Detection System☆38Updated 4 months ago
- ICS Security Labs☆35Updated 4 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆23Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated 2 weeks ago
- Adversary Emulation Planner☆38Updated 9 months ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆29Updated 6 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆56Updated 3 weeks ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆41Updated 2 years ago
- Operational Technology Cyber Attack Database☆47Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆37Updated 2 weeks ago
- ☆68Updated 7 months ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆12Updated last year
- Graphical Realism Framework for Industrial Control Simulation (GRFICS) version 3☆34Updated 3 years ago
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆13Updated last year
- A packet capture visualizer for industrial control networks.☆53Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆24Updated 4 months ago
- Operational Technology (OT) Simulator☆33Updated last month
- Augmentation to Machine Readable CTI☆30Updated 3 weeks ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆78Updated this week
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆34Updated last week
- ICS TestBed Framework☆65Updated 6 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated last week
- ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, …☆17Updated last week
- ☆19Updated 4 years ago
- ICS security resources☆98Updated last month
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆19Updated 3 months ago