Orange-Cyberdefense / awesome-industrial-protocols
Security-oriented list of resources about industrial network protocols.
☆532Updated 3 months ago
Alternatives and similar repositories for awesome-industrial-protocols:
Users that are interested in awesome-industrial-protocols are comparing it to the libraries listed below
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆135Updated 2 years ago
- Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC met…☆333Updated 3 months ago
- Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)☆446Updated last year
- OT SIEM Lab for ICS networks.☆72Updated this week
- Collection of writeups on ICS/SCADA security.☆169Updated last month
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆173Updated last year
- Industrial Security Scripts☆112Updated last week
- A curated list of tools related to Industrial Control System (ICS) security and Penetration Testing☆278Updated 3 years ago
- Advanced OPC-UA framework for vulnerability research & exploitation☆48Updated last year
- ICS security resources☆96Updated 3 weeks ago
- MITRE Caldera™ for OT Plugins & Capabilities☆203Updated 3 months ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆626Updated 7 months ago
- My personal OT resource list, gather throughout research and internet adventure.☆58Updated last week
- Tools, tips, tricks, and more for exploring ICS Security.☆1,707Updated 2 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,690Updated last year
- A curated list of awesome Memory Forensics for DFIR☆390Updated this week
- A Low-cost ICS Security Testbed for Education and Research☆108Updated 11 months ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆464Updated 6 months ago
- A centralized and enhanced memory analysis platform☆431Updated 2 weeks ago
- Lists of products useful for ICS security☆98Updated 7 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆846Updated last week
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆616Updated 8 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆485Updated last week
- CLI tools for forensic investigation of Windows artifacts☆325Updated 3 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,597Updated 3 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,093Updated 3 weeks ago
- Windows Local Privilege Escalation Cookbook☆1,053Updated last month
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆807Updated 3 years ago
- An ADCS honeypot to catch attackers in your internal network.☆280Updated 7 months ago
- A RedTeam Toolkit☆395Updated 4 months ago