center-for-threat-informed-defense / defending-ot-with-attackView external linksLinks
Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technology environments.
☆13May 28, 2025Updated 8 months ago
Alternatives and similar repositories for defending-ot-with-attack
Users that are interested in defending-ot-with-attack are comparing it to the libraries listed below
Sorting:
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Apr 24, 2023Updated 2 years ago
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆22Sep 19, 2020Updated 5 years ago
- ☆15Dec 4, 2023Updated 2 years ago
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- ☆14Jun 1, 2023Updated 2 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆59Oct 17, 2023Updated 2 years ago
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆91Updated this week
- Open-source CMDB for ICS and OT environments — map assets, visualize networks, track changes, and keep control.☆49Updated this week
- A Low-cost ICS Security Testbed for Education and Research☆119Mar 16, 2024Updated last year
- ☆74Apr 3, 2025Updated 10 months ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆91Jun 19, 2024Updated last year
- ICS Security Labs☆38Mar 27, 2021Updated 4 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆235Dec 22, 2025Updated last month
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 8 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup LeakBase☆67Aug 7, 2025Updated 6 months ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆16Dec 8, 2025Updated 2 months ago
- Lists of products useful for ICS security☆107Jun 24, 2024Updated last year
- ☆11Dec 22, 2022Updated 3 years ago
- 🔥🔥🔥 AI security automation platform. Build visual workflows, deploy autonomous agents, and automate threat detection and response. 80+…☆27Feb 11, 2026Updated last week
- One-click bookmarklet que acha AWS, Azure, Stripe, Firebase, JWT e chaves de alta entropia em qualquer app em 10 segundos☆39Dec 19, 2025Updated last month
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆10Jun 9, 2020Updated 5 years ago
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆13Mar 27, 2024Updated last year
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 2 years ago
- Official OWASP Top 10 Document Repository☆10Jan 9, 2018Updated 8 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- The CSET, Malcom, Con-PCA suite of tools☆13Mar 7, 2023Updated 2 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- A script to generate the Hackers Against Humanity deck.☆13Jan 21, 2024Updated 2 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆16Aug 5, 2025Updated 6 months ago
- Manage the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.☆13Jul 16, 2025Updated 7 months ago
- ☆10Aug 18, 2017Updated 8 years ago
- Display latest Cyber Security News within your PiMirror☆10Feb 23, 2021Updated 4 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- ☆15Dec 7, 2022Updated 3 years ago