cutaway-security / cutsec_toolsLinks
Scripts and other tools to helps parse data or gather information
☆66Updated 2 years ago
Alternatives and similar repositories for cutsec_tools
Users that are interested in cutsec_tools are comparing it to the libraries listed below
Sorting:
- Industrial Control Systems Network Protocol Parsers☆181Updated 2 months ago
- Sample files for Control Things Platform☆40Updated 6 months ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆87Updated last week
- A Low-cost ICS Security Testbed for Education and Research☆117Updated last year
- A packet capture visualizer for industrial control networks.☆55Updated last year
- EtherNet/IP & CIP Stack Detector☆47Updated 3 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆186Updated 2 months ago
- ICS Security Labs☆38Updated 4 years ago
- Lists of products useful for ICS security☆107Updated last year
- ICS security resources☆115Updated 6 months ago
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆56Updated 4 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆31Updated last year
- My Jupyter Notebooks☆36Updated 8 months ago
- Resources for SANS CTI Summit 2021 presentation☆104Updated 2 years ago
- Open Threat Hunting Framework☆121Updated 2 years ago
- ICS TestBed Framework☆69Updated 6 years ago
- Operational Technology Cyber Attack Database☆51Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- ☆72Updated 7 months ago
- CSIRT Jump Bag☆26Updated last year
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 4 years ago
- Graphical Realism Framework for Industrial Control Simulation (GRFICS) version 3☆44Updated 4 years ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Updated 5 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆68Updated last year
- All my slides for any talks☆23Updated last year
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆195Updated 2 years ago
- Automagically extract forensic timeline from volatile memory dump☆132Updated last year
- ☆23Updated 5 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆69Updated last month