CyberICS / Suricata-Rules-for-ICS-SCADA
Suricata rules for SCADA
☆14Updated 2 years ago
Alternatives and similar repositories for Suricata-Rules-for-ICS-SCADA:
Users that are interested in Suricata-Rules-for-ICS-SCADA are comparing it to the libraries listed below
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Claroty's Public Tools☆37Updated 4 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆72Updated this week
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 4 years ago
- A set of ICS IDS rules for use with Suricata.☆49Updated last year
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆15Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 3 years ago
- Look into EDR events from network☆23Updated 9 months ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆22Updated 3 years ago
- This repository has been archived in favor of https://github.com/idaholab/Malcolm-Test-Artifacts☆32Updated last month
- Passive ICS Network Scanner based on MAC Address Detection☆18Updated 4 years ago
- ☆16Updated 10 months ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆11Updated 3 years ago
- ☆21Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆28Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆61Updated 9 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆66Updated this week
- ☆41Updated 2 years ago
- Operational Technology (OT) Simulator☆30Updated 3 months ago
- Collection of resources for Industrial control system cybersecurity☆15Updated 2 years ago
- ISAF aims to be a framework that provides the necessary tools for the correct security audit of industrial environments. This repo is a m…☆56Updated last year
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 4 years ago
- zeek-scripts☆43Updated 6 years ago
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆50Updated 4 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆27Updated 4 months ago
- EtherNet/IP & CIP Stack Detector☆44Updated 2 years ago
- A packet capture visualizer for industrial control networks.☆51Updated last year
- Mapping NSM rules to MITRE ATT&CK☆68Updated 4 years ago
- Advanced OPC-UA framework for vulnerability research & exploitation☆45Updated last year