A curated list of resources related to Industrial Control System (ICS) security.
☆21Aug 23, 2021Updated 4 years ago
Alternatives and similar repositories for awesome-industrial-control-system-security
Users that are interested in awesome-industrial-control-system-security are comparing it to the libraries listed below
Sorting:
- DNP3 Cyber-attack datasets☆15Mar 9, 2017Updated 9 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆26Sep 24, 2025Updated 5 months ago
- ☆18Aug 13, 2020Updated 5 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- ☆26Nov 9, 2021Updated 4 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware☆243May 4, 2021Updated 4 years ago
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆32Oct 13, 2018Updated 7 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- ICS Security Labs☆38Mar 27, 2021Updated 4 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- Sample files for Control Things Platform☆43Updated this week
- Bitcoin Hardware Wallet Interaction scripts☆11Jan 30, 2026Updated last month
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Source for the STIX Documentation site☆49Aug 23, 2021Updated 4 years ago
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆60Oct 17, 2023Updated 2 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆14Jul 6, 2025Updated 8 months ago
- ☆11Mar 9, 2018Updated 8 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- Introduction to Encryption☆13Jul 28, 2025Updated 7 months ago
- ☆12Aug 17, 2020Updated 5 years ago
- Rigorous computation of the endomorphism ring of a Jacobian☆11Jul 31, 2025Updated 7 months ago
- Learn about cryptography concepts - Both basics and core.☆10Aug 9, 2024Updated last year
- PLUTO-GPS-SIM generates a GPS baseband signal IQ data stream, which is then transmitted by the software-defined radio (SDR) platform ADA…☆12Dec 27, 2021Updated 4 years ago
- A lookup table for the discrete log in secp265k1☆23Feb 27, 2021Updated 5 years ago
- A tiny script to convert your mdx dictionary file to CSV☆11Dec 22, 2018Updated 7 years ago
- A SETI / technosignature search code to find intelligent life beyond Earth☆13Dec 15, 2025Updated 2 months ago
- USIM, EDITOR, IMSI, ICCID, MCC/MNC, SPN, GID1, GID2☆15Mar 8, 2020Updated 6 years ago
- ☆14Nov 1, 2024Updated last year