nathanpocock / I-ISMS
Industrial Information Security Management System
☆98Updated 4 years ago
Alternatives and similar repositories for I-ISMS:
Users that are interested in I-ISMS are comparing it to the libraries listed below
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆176Updated 9 months ago
- Lists of products useful for ICS security☆98Updated 7 months ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆88Updated 2 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆148Updated 2 years ago
- Cyber Incident Response Team Playbook Battle Cards☆370Updated 9 months ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆173Updated last year
- A curated list of awesome things related to TheHive & Cortex☆175Updated 3 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆73Updated this week
- ☆68Updated 6 months ago
- Cybersecurity Incident Response Plan☆88Updated 4 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆203Updated 3 months ago
- Beer-ISAC Community Resources☆26Updated 4 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 9 months ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆246Updated last month
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆53Updated 4 years ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Industrial Control Systems Network Protocol Parsers☆161Updated last month
- ICS security resources☆96Updated 3 weeks ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆116Updated 6 months ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆86Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆271Updated last year
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆80Updated 3 years ago
- Operational Technology Cyber Attack Database☆47Updated 2 years ago
- CASCADE Server☆265Updated 2 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆185Updated 3 years ago