Fortiphyd / GRFICSv2
Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
☆386Updated last year
Related projects: ⓘ
- Collection of writeups on ICS/SCADA security.☆146Updated 3 months ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆162Updated last year
- Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC met…☆313Updated this week
- MITRE Caldera™ for OT Plugins & Capabilities☆185Updated 8 months ago
- ICS security resources☆88Updated 3 weeks ago
- A set of Zeek scripts to detect ATT&CK techniques.☆550Updated 2 months ago
- Tools, tips, tricks, and more for exploring ICS Security.☆1,606Updated last month
- A curated list of resources related to Industrial Control System (ICS) security.☆1,591Updated 10 months ago
- ☆503Updated last month
- Industrial Control Systems Network Protocol Parsers☆155Updated this week
- Lists of products useful for ICS security☆92Updated 2 months ago
- A Low-cost ICS Security Testbed for Education and Research☆100Updated 6 months ago
- A curated list of tools related to Industrial Control System (ICS) security and Penetration Testing☆266Updated 2 years ago
- Graphical Realism Framework for Industrial Control Simulations☆211Updated 2 months ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆151Updated last year
- ☆632Updated this week
- Industrial Security Scripts☆101Updated last year
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆497Updated 2 weeks ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆658Updated last month
- Security-oriented list of resources about industrial network protocols.☆453Updated 2 weeks ago
- A collection of ICS/SCADA PCAPs☆425Updated 4 years ago
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆529Updated last year
- A repository of curated datasets from various attacks☆564Updated this week
- Signatures and IoCs from public Volexity blog posts.☆307Updated last month
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆536Updated 3 weeks ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆636Updated last year
- A collection of resources for Threat Hunters☆845Updated 2 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆758Updated 11 months ago
- Set of SIGMA rules (>320) mapped to MITRE ATT&CK tactic and techniques☆300Updated 3 months ago