A curated list of resources related to Industrial Control System (ICS) security.
☆32May 27, 2016Updated 9 years ago
Alternatives and similar repositories for awesome-industrial-control-system-security
Users that are interested in awesome-industrial-control-system-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Awesome list of resources related to container security☆248Apr 27, 2026Updated last week
- Awesome list for High Performance Computing / Parallel Computing resources.☆12Sep 20, 2017Updated 8 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Mar 29, 2026Updated last month
- ☆16Aug 2, 2025Updated 9 months ago
- Repo for user submitted stencils☆14Jun 9, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- hyperGRC is a lightweight, in-browser tool for managing compliance-as-code repositories in OpenControl format.☆29Jan 19, 2022Updated 4 years ago
- Speak to your shell using various metaphors sourced from differing cultural dialects.☆14Jan 14, 2021Updated 5 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- ☆21May 8, 2022Updated 3 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆990Nov 27, 2023Updated 2 years ago
- Theano Classical Fonts☆16Jan 31, 2022Updated 4 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,580Jan 5, 2026Updated 4 months ago
- WLEAPP is an open source project that aims to parse Windows OS artifacts for the purpose of triage analysis.☆34Nov 16, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆13Apr 1, 2019Updated 7 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Apr 21, 2026Updated last week
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Simple command line integration to Chat GPT☆11Jan 23, 2023Updated 3 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 8 months ago
- OpenControl-formatted industry standards and requirement documents☆50Aug 28, 2023Updated 2 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Oct 30, 2019Updated 6 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Scraping darknet forums has been the object of research in the field of intelligence and security informatics. In this repository we scr…☆11May 18, 2023Updated 2 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated 2 years ago
- A curated list of hacking environments where you can train your cyber skills legally and safely☆4,370Jul 2, 2024Updated last year
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆83Mar 25, 2026Updated last month
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- A Debian package that provides information about the Tarot and various Tarot decks as a UNIX-like manual page.☆19Feb 10, 2021Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 4 years ago
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- Repository of SCAP content developed fully or in part by the NIWC Atlantic SCAP team☆46Apr 28, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Maltego transform for visualizing Nessus scan data☆45Dec 11, 2019Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Robotics Learning Note☆11Jun 22, 2018Updated 7 years ago
- Open Source trojan for android.☆21Mar 21, 2024Updated 2 years ago