PacktPublishing / Industrial-Cybersecurity-Second-EditionLinks
Industrial Cybersecurity Second Edition, published by Packt
☆30Updated 2 years ago
Alternatives and similar repositories for Industrial-Cybersecurity-Second-Edition
Users that are interested in Industrial-Cybersecurity-Second-Edition are comparing it to the libraries listed below
Sorting:
- ☆59Updated 2 years ago
- My eBook with tips on how to get started in industrial (ICS/OT) cyber security.☆52Updated last year
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆177Updated 2 years ago
- Incident Response with Threat Intelligence, published by Packt☆52Updated last year
- ICS security resources☆108Updated 2 months ago
- Operational Technology Cyber Attack Database☆49Updated 2 years ago
- ICS Security Labs☆37Updated 4 years ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆12Updated last month
- ☆71Updated 3 months ago
- MITRE Caldera™ for OT Plugins & Capabilities☆215Updated last week
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆83Updated this week
- ☆47Updated 2 years ago
- Automating Security Detection Engineering, published by Packt☆59Updated 9 months ago
- Practical Threat Detection Engineering, Published by Packt☆75Updated 2 years ago
- Graphical Realism Framework for Industrial Control Simulation (GRFICS) version 3☆41Updated 4 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated last month
- Scripts and other tools to helps parse data or gather information☆66Updated 2 years ago
- OT Security Lab for ICS networks☆325Updated last week
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆92Updated last year
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆53Updated 2 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆128Updated last year
- Open Threat Hunting Framework☆117Updated 2 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Updated last year
- ☆108Updated last month
- The latest pyWars client for the SEC573 class☆44Updated 4 months ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆30Updated 10 months ago
- Docker Crash Course: How to containerize your favorite security tools☆28Updated 2 years ago
- A curated repository of incident response playbooks☆92Updated 2 years ago