Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technology environments.
☆14May 28, 2025Updated 11 months ago
Alternatives and similar repositories for defending-ot-with-attack
Users that are interested in defending-ot-with-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities☆13Jun 7, 2020Updated 5 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆13Mar 20, 2026Updated last month
- ☆14Jun 1, 2023Updated 2 years ago
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆22Sep 19, 2020Updated 5 years ago
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆60Oct 17, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆94Updated this week
- ☆16Dec 4, 2023Updated 2 years ago
- A script to generate the Hackers Against Humanity deck.☆14Jan 21, 2024Updated 2 years ago
- ICS Security Labs☆39Mar 27, 2021Updated 5 years ago
- Automatic installation of Devstack/OpenStack on virtual Ubuntu-Server-14.04.3☆13Mar 7, 2017Updated 9 years ago
- ☆14Nov 12, 2021Updated 4 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Lists of products useful for ICS security☆108Jun 24, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Low-cost ICS Security Testbed for Education and Research☆120Mar 16, 2024Updated 2 years ago
- ☆75Apr 3, 2025Updated last year
- MITRE Caldera™ for OT Plugins & Capabilities☆246Dec 22, 2025Updated 4 months ago
- Process, reduce, and transform Palo Alto Networks Firewall logs.☆19Aug 26, 2025Updated 8 months ago
- Splunk Stuffs!☆14Oct 14, 2023Updated 2 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆25Apr 30, 2026Updated last week
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- ISAF aims to be a framework that provides the necessary tools for the correct security audit of industrial environments. This repo is a m…☆59Nov 13, 2023Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 11 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆16Nov 13, 2024Updated last year
- ☆15Dec 7, 2022Updated 3 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 6 months ago
- ☆70Jul 16, 2023Updated 2 years ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆54Apr 2, 2026Updated last month
- Open-source CMDB for ICS and OT environments — map assets, visualize networks, track changes, and keep control.☆55Mar 18, 2026Updated last month
- Industrial control Security Tool☆77Feb 28, 2021Updated 5 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆36Feb 9, 2025Updated last year
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated last year
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆93Jun 19, 2024Updated last year
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 10 months ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Apr 21, 2026Updated 2 weeks ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago