Orange-Cyberdefense / awesome-industrial-protocols
Security-oriented list of resources about industrial network protocols.
☆453Updated 2 weeks ago
Related projects: ⓘ
- Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC met…☆313Updated this week
- Collection of writeups on ICS/SCADA security.☆146Updated 3 months ago
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆115Updated last year
- Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)☆386Updated last year
- MITRE Caldera™ for OT Plugins & Capabilities☆185Updated 8 months ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆586Updated 2 months ago
- A curated list of tools related to Industrial Control System (ICS) security and Penetration Testing☆266Updated 2 years ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆162Updated last year
- Different learning materials☆214Updated last month
- Sticky notes for pentesting, bug bounty, CTF.☆592Updated this week
- Hardware/IOT Pentesting Wiki☆452Updated last week
- A centralized and enhanced memory analysis platform☆355Updated last week
- Map tracking ransomware, by OCD World Watch team☆383Updated 5 months ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆493Updated 8 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆150Updated 2 years ago
- This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.☆487Updated last month
- ☆247Updated 2 months ago
- A curated list of awesome Memory Forensics for DFIR☆319Updated 10 months ago
- Advanced OPC-UA framework for vulnerability research & exploitation☆40Updated last year
- A RedTeam Toolkit☆377Updated 7 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆88Updated last month
- My personal OT resource list, gather throughout research and internet adventure.☆33Updated 2 months ago
- ICS security resources☆88Updated 3 weeks ago
- CLI tools for forensic investigation of Windows artifacts☆296Updated last month
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆485Updated this week
- ☆426Updated this week
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆515Updated 3 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆268Updated 2 weeks ago
- Red Team Attack Lab for TTP testing & research☆543Updated last year