CyberICS / Suricata-Rules-for-ICS-SCADA
Suricata rules for SCADA
☆14Updated 2 years ago
Alternatives and similar repositories for Suricata-Rules-for-ICS-SCADA:
Users that are interested in Suricata-Rules-for-ICS-SCADA are comparing it to the libraries listed below
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 4 years ago
- Claroty's Public Tools☆37Updated 5 years ago
- A set of ICS IDS rules for use with Suricata.☆49Updated last year
- Passive ICS Network Scanner based on MAC Address Detection☆18Updated 4 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆15Updated 4 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- ISAF aims to be a framework that provides the necessary tools for the correct security audit of industrial environments. This repo is a m…☆56Updated last year
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆78Updated this week
- Snort rules☆10Updated 9 years ago
- ☆16Updated last year
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆46Updated 10 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆94Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Operational Technology (OT) Simulator☆33Updated last month
- List of default passwords for Industrial Control Systems☆72Updated 8 years ago
- Triconex TriStation utilities and tools☆74Updated 6 years ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated last week
- A collection of ICS/SCADA PCAPs☆26Updated 5 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆29Updated 6 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated 11 months ago
- Modbus TCP vulnerability demonstration☆13Updated 5 years ago
- Malmod☆14Updated 5 years ago
- Lists of products useful for ICS security☆102Updated 9 months ago
- Zeek network security monitor plugin that enables parsing of the BACnet standard building controls protocol☆31Updated 10 months ago
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆53Updated 4 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆29Updated last month