ITI / ICS-Security-Tools
Tools, tips, tricks, and more for exploring ICS Security.
☆1,741Updated last week
Alternatives and similar repositories for ICS-Security-Tools:
Users that are interested in ICS-Security-Tools are comparing it to the libraries listed below
- A curated list of resources related to Industrial Control System (ICS) security.☆1,739Updated last year
- ICS/SCADA honeypot☆1,318Updated 4 months ago
- A collection of ICS/SCADA PCAPs☆476Updated 5 years ago
- Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)☆486Updated 2 years ago
- Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in suppo…☆965Updated 5 years ago
- ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python☆1,056Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated 9 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,186Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,570Updated last year
- Digital Bond's ICS Enumeration Tools☆445Updated 5 years ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,120Updated 9 months ago
- A curated list of awesome YARA rules, tools, and people.☆3,775Updated last month
- APT & CyberCriminal Campaign Collection☆3,869Updated 9 months ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,113Updated 2 weeks ago
- APTnotes data☆1,703Updated 4 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,103Updated 3 weeks ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,737Updated 9 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,253Updated last year
- A collection of sources of indicators of compromise.☆850Updated 6 months ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,192Updated 4 years ago
- Re-play Security Events☆1,637Updated last year
- Interesting APT Report Collection And Some Special IOC☆2,534Updated this week
- Windows Events Attack Samples☆2,345Updated 2 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,767Updated 3 years ago
- Detect Tactics, Techniques & Combat Threats☆2,145Updated 2 months ago
- A collection of resources for Threat Hunters☆881Updated 6 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,449Updated 2 months ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆1,840Updated this week
- ☆1,072Updated 5 years ago
- Configuration files for the SOF-ELK VM☆1,577Updated 3 weeks ago