mekin / awesome-industrial-control-system-security
A curated list of resources related to Industrial Control System (ICS) security.
☆30Updated 8 years ago
Alternatives and similar repositories for awesome-industrial-control-system-security:
Users that are interested in awesome-industrial-control-system-security are comparing it to the libraries listed below
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- an awesome list of active defense resources☆118Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆52Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆39Updated 11 months ago
- a curated list of useful threat modeling resources☆129Updated 8 months ago
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 4 years ago
- Cybersecurity Incident Response Plan☆89Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆40Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- A collaborative CISSP notes card☆40Updated 9 years ago
- ☆15Updated 6 years ago
- Curated list of awesome, open source data exfiltration tools☆56Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- Practice CTI Quiz☆13Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆62Updated 11 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- ☆10Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆26Updated 5 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆68Updated 3 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 4 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆33Updated 2 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 2 months ago