cutaway-security / cutsec_presentationsLinks
Presentation Slides and Resources
☆16Updated last year
Alternatives and similar repositories for cutsec_presentations
Users that are interested in cutsec_presentations are comparing it to the libraries listed below
Sorting:
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated last year
- IEC104 Client for Metasploit☆11Updated 6 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Updated 9 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 8 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- ☆29Updated 8 years ago
- CybatiWorks-1 ICS/SCADA/IoT/IT Cybersecurity Education Platform☆9Updated 10 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆16Updated 4 years ago
- NMAP NSE script for detecting devices that speak the Crimson v3 protocol☆12Updated 10 years ago
- ☆11Updated 4 years ago
- Wireshark dissector for wirelessHART☆13Updated 7 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Tools to interact with Siemens PLCs☆13Updated last year
- Zeek Ethercat Parser - CISA ICSNPP☆17Updated 9 months ago
- Indices for courses in SANS' Network Security Operations curriculum☆16Updated 9 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆15Updated 5 months ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- ☆22Updated 4 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- ☆16Updated last year
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- ☆30Updated 6 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 7 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Updated 8 years ago