cisagov / icsnpp-profinet-io-cmLinks
Zeek Profinet I/O Context Manager Parser - CISA ICSNPP
☆13Updated last week
Alternatives and similar repositories for icsnpp-profinet-io-cm
Users that are interested in icsnpp-profinet-io-cm are comparing it to the libraries listed below
Sorting:
- ☆16Updated last year
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated 3 months ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆23Updated 7 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 3 weeks ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Documentation and guidance to practice secure coding for various PLC vendors☆37Updated last year
- Presentation Slides and Resources☆16Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 11 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆49Updated last month
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- URL fingerprinting made easy☆87Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- create a "simulated internet" cyber range environment☆17Updated last month
- A go-exploit to scan for implanted Cisco IOS XE Systems☆42Updated 8 months ago
- ☆20Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year
- IOCs and detection script for COATHANGER malware☆55Updated last year
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Updated last year
- Linux #rootkit and #malware revealer☆26Updated 11 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- ☆32Updated 2 years ago
- ☆11Updated 4 years ago
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆49Updated 5 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year