Fortiphyd / GRFICSv2
Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
☆434Updated last year
Alternatives and similar repositories for GRFICSv2:
Users that are interested in GRFICSv2 are comparing it to the libraries listed below
- Collection of writeups on ICS/SCADA security.☆163Updated last week
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆173Updated last year
- MITRE Caldera™ for OT Plugins & Capabilities☆202Updated last month
- Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC met…☆329Updated 2 months ago
- ICS security resources☆93Updated last week
- Lists of products useful for ICS security☆98Updated 6 months ago
- Industrial Control Systems Network Protocol Parsers☆160Updated last week
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆132Updated 2 years ago
- A Low-cost ICS Security Testbed for Education and Research☆107Updated 10 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,673Updated last year
- ☆512Updated 3 months ago
- A curated list of tools related to Industrial Control System (ICS) security and Penetration Testing☆275Updated 3 years ago
- Security-oriented list of resources about industrial network protocols.☆511Updated 2 months ago
- Tools, tips, tricks, and more for exploring ICS Security.☆1,681Updated 3 weeks ago
- Graphical Realism Framework for Industrial Control Simulations☆215Updated 6 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆537Updated this week
- A set of Zeek scripts to detect ATT&CK techniques.☆571Updated 6 months ago
- A python module for working with ATT&CK☆499Updated this week
- Industrial Security Scripts☆109Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,091Updated last week
- SIEM Tactics, Techiques, and Procedures☆602Updated last week
- Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques☆329Updated this week
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆569Updated this week
- STIX data representing MITRE ATT&CK☆354Updated 2 months ago
- Awesome Security lists for SOC/CERT/CTI☆794Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆498Updated last week
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆591Updated 5 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆691Updated 3 weeks ago
- A collection of ICS/SCADA PCAPs☆452Updated 5 years ago