Open-source CMDB for ICS and OT environments — map assets, visualize networks, track changes, and keep control.
☆55Mar 18, 2026Updated last month
Alternatives and similar repositories for industrace
Users that are interested in industrace are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellen…☆36Apr 10, 2026Updated last week
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆33Sep 4, 2024Updated last year
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 10 months ago
- ICS Security Labs☆39Mar 27, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆21May 14, 2017Updated 8 years ago
- ☆21Aug 31, 2022Updated 3 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Nov 17, 2015Updated 10 years ago
- Exploit, Malware and Vulnerability Scoring Application☆15Oct 5, 2023Updated 2 years ago
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆22Sep 19, 2020Updated 5 years ago
- python framework to parse logs for IR☆15May 2, 2021Updated 4 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- GitHub Repository for the HW CWE SIG☆17Mar 25, 2026Updated 3 weeks ago
- ☆21Aug 13, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆74Apr 3, 2025Updated last year
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆36Mar 24, 2025Updated last year
- We want to create a dynamic monitoring and evaluation tool aims to check and test the resistance level or resilience of communication bet…☆14Mar 30, 2026Updated 2 weeks ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆18Mar 21, 2025Updated last year
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆93Jun 19, 2024Updated last year
- Play the classic roguelike game BrogueCE in your Kubernetes cluster with a controller acting as the dungeon master to validate and mutate…☆18Mar 24, 2025Updated last year
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆92Updated this week
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PowerShell - Endpoint Analysis Solution Your Windows Intranet Needs☆48Dec 4, 2024Updated last year
- Structured Threat Intelligence Graph☆99Dec 30, 2025Updated 3 months ago
- CISA CSAF Security Advisories☆101Apr 9, 2026Updated last week
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆14May 27, 2019Updated 6 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Graphical Realism Framework for Industrial Control Simulation (GRFICS) version 3☆55Apr 13, 2021Updated 5 years ago
- OT Security Lab for ICS networks☆697Mar 2, 2026Updated last month
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆118Jul 29, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Reverse engineered the villager pypi package to github repo for analysis☆26Sep 20, 2025Updated 6 months ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆34Feb 12, 2026Updated 2 months ago
- ☆15Dec 7, 2022Updated 3 years ago
- Artifact for the paper Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems at CPSIoTSec 202…☆13Nov 17, 2022Updated 3 years ago
- ☆18Aug 13, 2020Updated 5 years ago
- A Shiny Web App tutorial inspecting the COVID-19 (2019-nCoV) epidemic, data from https://github.com/CSSEGISandData/COVID-19/tree/master/c…☆10Apr 18, 2020Updated 6 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated 2 months ago