Documentation and guidance to practice secure coding for various PLC vendors
☆42Oct 27, 2023Updated 2 years ago
Alternatives and similar repositories for Secure_PLC_Coding
Users that are interested in Secure_PLC_Coding are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Mar 20, 2026Updated 2 weeks ago
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- Malmod☆14Jan 19, 2020Updated 6 years ago
- Artifact for the paper Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems at CPSIoTSec 202…☆13Nov 17, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆61Oct 17, 2023Updated 2 years ago
- Zeek Ethernet/IP and CIP Parser - CISA ICSNPP☆26Mar 3, 2026Updated last month
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- Network fuzzer for the modbus protocol☆22May 20, 2023Updated 2 years ago
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆17Mar 24, 2026Updated 2 weeks ago
- ICS security resources☆132May 7, 2025Updated 11 months ago
- ICS TestBed Framework☆71Jan 10, 2019Updated 7 years ago
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆62Mar 4, 2026Updated last month
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆92Apr 3, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Low-cost ICS Security Testbed for Education and Research☆118Mar 16, 2024Updated 2 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- ☆18Aug 13, 2020Updated 5 years ago
- Operational Technology Cyber Attack Database☆52Jul 22, 2022Updated 3 years ago
- Schweitzer Engineering Laboratories (SEL) Protocol Bindings in Python☆18May 1, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆14Jun 19, 2024Updated last year
- Damn Vulnerable Chemical Process - Vinyl Acetate Monomer☆22Dec 13, 2015Updated 10 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Zeek Ethercat Parser - CISA ICSNPP☆18Mar 3, 2026Updated last month
- Static analysis of IEC 61131-3 programs☆95Mar 31, 2026Updated last week
- Operational Technology (OT) Simulator☆55Oct 6, 2025Updated 6 months ago
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Mar 3, 2026Updated last month
- Adapter to enable LX200 protocol on Dwarf2 smart telescope.☆11Aug 9, 2023Updated 2 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆11Dec 30, 2020Updated 5 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆242Dec 22, 2025Updated 3 months ago
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆39Oct 5, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ISAF aims to be a framework that provides the necessary tools for the correct security audit of industrial environments. This repo is a m…☆60Nov 13, 2023Updated 2 years ago
- Zeek OPCUA Binary Parser - CISA ICSNPP☆21Mar 3, 2026Updated last month
- A project repository to store documented experimentation on warwalking subject and look alikes, with affordable or popular hardware, code…☆20Jan 28, 2024Updated 2 years ago
- ICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From …☆16Aug 31, 2023Updated 2 years ago
- Security-oriented list of resources about industrial network protocols.☆684Mar 12, 2026Updated 3 weeks ago
- ☆16Mar 19, 2026Updated 3 weeks ago
- ☆19Oct 30, 2020Updated 5 years ago