cutaway-security / cutsec_toolsLinks
Scripts and other tools to helps parse data or gather information
☆66Updated 2 years ago
Alternatives and similar repositories for cutsec_tools
Users that are interested in cutsec_tools are comparing it to the libraries listed below
Sorting:
- ICS Security Labs☆37Updated 4 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆83Updated this week
- A Low-cost ICS Security Testbed for Education and Research☆116Updated last year
- Sample files for Control Things Platform☆40Updated 2 months ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆182Updated 2 months ago
- Lists of products useful for ICS security☆105Updated last year
- Industrial Control Systems Network Protocol Parsers☆176Updated 2 weeks ago
- ICS security resources☆108Updated 2 months ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆30Updated 10 months ago
- A packet capture visualizer for industrial control networks.☆55Updated last year
- EtherNet/IP & CIP Stack Detector☆45Updated 2 years ago
- Operational Technology Cyber Attack Database☆49Updated 2 years ago
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆57Updated 4 years ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆177Updated 2 years ago
- Resources for SANS CTI Summit 2021 presentation☆103Updated last year
- My Jupyter Notebooks☆36Updated 4 months ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆78Updated last year
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Updated 4 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Graphical Realism Framework for Industrial Control Simulation (GRFICS) version 3☆41Updated 4 years ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- ☆71Updated 3 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Python library for threat intelligence☆87Updated 6 months ago
- An assessment tool to interact with Velocio PLCs☆13Updated 3 years ago
- ☆54Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆46Updated 6 years ago
- Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics☆78Updated last year