Fortiphyd / Secure_PLC_CodingLinks
Documentation and guidance to practice secure coding for various PLC vendors
☆38Updated last year
Alternatives and similar repositories for Secure_PLC_Coding
Users that are interested in Secure_PLC_Coding are comparing it to the libraries listed below
Sorting:
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13Updated 3 months ago
- Operational Technology Cyber Attack Database☆49Updated 3 years ago
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆157Updated 2 years ago
- Advanced OPC-UA framework for vulnerability research & exploitation☆61Updated 2 years ago
- BusPwn V1.0 is a powerful Modbus hacking framework designed for testing and exploiting vulnerabilities in Modbus-based systems commonly f…☆23Updated 4 months ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆23Updated 8 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆131Updated last year
- ICS Security Labs☆37Updated 4 years ago
- ☆21Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆32Updated 6 months ago
- ICS security resources☆108Updated 3 months ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆53Updated 3 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆84Updated this week
- A network logging tool that logs per process activities☆32Updated 2 years ago
- ☆32Updated 2 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆84Updated last year
- ☆35Updated 9 months ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Updated last year
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- ☆28Updated 11 months ago
- Sniffing out well-known threat groups☆52Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆43Updated last month
- Operational Technology (OT) Simulator☆43Updated last week
- ☆34Updated 2 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- ☆60Updated 2 years ago
- Some of my rough notes for Docker threat detection☆47Updated 2 years ago