Open-source CMDB for ICS and OT environments — map assets, visualize networks, track changes, and keep control.
☆52Mar 18, 2026Updated last week
Alternatives and similar repositories for industrace
Users that are interested in industrace are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Mar 20, 2026Updated last week
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆32Sep 4, 2024Updated last year
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 10 months ago
- ICS Security Labs☆38Mar 27, 2021Updated 5 years ago
- ☆21May 14, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆21Aug 31, 2022Updated 3 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Nov 17, 2015Updated 10 years ago
- Exploit, Malware and Vulnerability Scoring Application☆15Oct 5, 2023Updated 2 years ago
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆22Sep 19, 2020Updated 5 years ago
- python framework to parse logs for IR☆15May 2, 2021Updated 4 years ago
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆42Mar 23, 2026Updated last week
- ☆21Aug 13, 2025Updated 7 months ago
- ☆75Apr 3, 2025Updated 11 months ago
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆36Mar 24, 2025Updated last year
- We want to parse the from the host/dist or in the mid to analysis the network communication protocol to identify whether the communicati…☆14Feb 24, 2026Updated last month
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆18Mar 21, 2025Updated last year
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆93Jun 19, 2024Updated last year
- Play the classic roguelike game BrogueCE in your Kubernetes cluster with a controller acting as the dungeon master to validate and mutate…☆18Mar 24, 2025Updated last year
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆92Updated this week
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Dec 4, 2024Updated last year
- Structured Threat Intelligence Graph☆99Dec 30, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆14May 27, 2019Updated 6 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- OT Security Lab for ICS networks☆689Mar 2, 2026Updated 3 weeks ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 10 months ago
- PowerShell-based Windows Server Security Audit Engine by Cyb3rint3l Labs. Measures alignment with the NIS2 directive and maps findings to…☆42Feb 1, 2026Updated last month
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆31Feb 12, 2026Updated last month
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆61Oct 17, 2023Updated 2 years ago
- ☆15Dec 7, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Shiny Web App tutorial inspecting the COVID-19 (2019-nCoV) epidemic, data from https://github.com/CSSEGISandData/COVID-19/tree/master/c…☆10Apr 18, 2020Updated 5 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated 2 months ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆58Apr 30, 2025Updated 11 months ago
- Files to automatically deploy red team Active Directory test lab☆49May 6, 2022Updated 3 years ago
- Hunt Smarter, Hunt Harder☆146Mar 14, 2026Updated 2 weeks ago
- ☆15Nov 16, 2025Updated 4 months ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year