cutaway-security / cutsec_presentations
Presentation Slides and Resources
☆16Updated 11 months ago
Alternatives and similar repositories for cutsec_presentations
Users that are interested in cutsec_presentations are comparing it to the libraries listed below
Sorting:
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆16Updated 4 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- CybatiWorks-1 ICS/SCADA/IoT/IT Cybersecurity Education Platform☆9Updated 10 years ago
- IEC104 Client for Metasploit☆11Updated 6 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- Tools to interact with Siemens PLCs☆13Updated last year
- ☆29Updated 8 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Updated 8 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- ☆11Updated 4 years ago
- Wireshark dissector for wirelessHART☆13Updated 7 years ago
- Zeek Ethercat Parser - CISA ICSNPP☆15Updated 7 months ago
- Site for IWS book content☆18Updated 6 years ago
- DeTT&CT Editor☆12Updated last week
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 4 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- NMAP NSE script for detecting devices that speak the Crimson v3 protocol☆12Updated 10 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- Cloned from now gone Digitalbond page.☆15Updated 8 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- ☆30Updated 6 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆22Updated 5 months ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆17Updated last month