Industrial Cybersecurity Second Edition, published by Packt
☆34Jan 30, 2023Updated 3 years ago
Alternatives and similar repositories for Industrial-Cybersecurity-Second-Edition
Users that are interested in Industrial-Cybersecurity-Second-Edition are comparing it to the libraries listed below
Sorting:
- Purple Team Strategies, Published by Packt☆14Mar 2, 2026Updated last week
- ☆66Jul 16, 2023Updated 2 years ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆198May 10, 2023Updated 2 years ago
- Vistumbler WifiDB - A set of scripts and tools to manage Wireless Access Points gathered with Vistumber. (Forked from our original projec…☆24Feb 15, 2026Updated 3 weeks ago
- Materials and Synopsis of the course Certified Network Security Specialist (CNSS) provided by The International CyberSecurity Institute (…☆29Aug 31, 2020Updated 5 years ago
- GRFICSv3 is a FREE and open source OT security lab with realistic networking and a 3D process simulation for training and learning ICS se…☆83Feb 13, 2026Updated 3 weeks ago
- Industrial Security Scripts☆145Mar 1, 2026Updated last week
- Evaluate and compare SBOMs of Maven projects☆13Mar 3, 2023Updated 3 years ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 2 months ago
- ☆13Aug 18, 2021Updated 4 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- ☆10Mar 6, 2023Updated 3 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- A repo to support the book☆46Jan 18, 2023Updated 3 years ago
- ☆10Mar 11, 2024Updated last year
- ☆12Jul 4, 2024Updated last year
- ☆14Feb 19, 2023Updated 3 years ago
- Lists of products useful for ICS security☆108Jun 24, 2024Updated last year
- A GAN (Generative adversarial network) implementation for iOS with CoreML☆12May 17, 2019Updated 6 years ago
- ☆15Apr 20, 2020Updated 5 years ago
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- The Complete Scrum Master Certification and Agile Scrum Course, published by Packt☆12Nov 7, 2023Updated 2 years ago
- A Python script that helps generate a Fortigate script to add multiple address objects and also creates an address object group for them☆12Jan 31, 2021Updated 5 years ago
- Docker: Alpine Linux and Wekan <=> MongoDB☆10Mar 27, 2025Updated 11 months ago
- A library for parsing security advisories☆13Feb 5, 2026Updated last month
- Unit test for ACRN, including unit test cases for hypervisor and device model.☆12Sep 23, 2022Updated 3 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- This repository is related to specialized books published by the THB team.☆20Aug 13, 2025Updated 6 months ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Build, edit, validate, and export CycloneDX BOMs through an intuitive browser-based interface☆14Updated this week
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- Unofficial mirror of GNUK's submodule: Chopstx☆12Aug 15, 2020Updated 5 years ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- (Fork for Preparing and Testing Contributions) The FOSSology software is a system for analyzing and studying FOSS – Free and Open Source …☆12Updated this week
- A script to generate the Hackers Against Humanity deck.☆13Jan 21, 2024Updated 2 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Asciidoc template for advanced level curricula☆14Feb 23, 2026Updated 2 weeks ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago