SecuraBV / OTCADLinks
Operational Technology Cyber Attack Database
☆49Updated 2 years ago
Alternatives and similar repositories for OTCAD
Users that are interested in OTCAD are comparing it to the libraries listed below
Sorting:
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆83Updated this week
- ICS Security Labs☆37Updated 4 years ago
- Scripts and other tools to helps parse data or gather information☆66Updated 2 years ago
- ICS security resources☆108Updated 2 months ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆12Updated last month
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆30Updated 10 months ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- A packet capture visualizer for industrial control networks.☆55Updated last year
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆32Updated 5 months ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆78Updated last year
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Updated last year
- Operational Technology (OT) Simulator☆42Updated 4 months ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆177Updated 2 years ago
- A Low-cost ICS Security Testbed for Education and Research☆116Updated last year
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated 3 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Industrial Control Systems Network Protocol Parsers☆176Updated 2 weeks ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- A CALDERA plugin☆26Updated 11 months ago
- ☆71Updated 3 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 3 months ago
- Lists of products useful for ICS security☆105Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Open Threat Hunting Framework☆117Updated 2 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆31Updated 4 months ago
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆116Updated 2 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago