CyberICS / Suricata-Rules-for-ICS-SCADA
Suricata rules for SCADA
☆13Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Suricata-Rules-for-ICS-SCADA
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 4 years ago
- Claroty's Public Tools☆37Updated 4 years ago
- Operational Technology (OT) Simulator☆29Updated last month
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆15Updated 4 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆72Updated this week
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆16Updated 2 weeks ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆27Updated 2 years ago
- ☆16Updated 8 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- ☆41Updated 7 months ago
- ☆47Updated this week
- A collection of ICS/SCADA PCAPs☆26Updated 4 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆22Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆34Updated 7 months ago
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆50Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 3 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆27Updated 2 months ago
- A set of PCAPs used to test the parsers used by Malcolm. Also, a curated list of PCAP collections I've found online.☆32Updated this week
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆63Updated 5 months ago
- A set of ICS IDS rules for use with Suricata.☆47Updated last year
- ☆21Updated 2 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆11Updated 3 years ago
- Look into EDR events from network☆23Updated 7 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- ☆41Updated last year
- EtherNet/IP & CIP Stack Detector☆43Updated 2 years ago
- A repository of Sysmon For Linux configuration modules☆15Updated 3 years ago
- Lists of products useful for ICS security☆97Updated 4 months ago