OT security monitoring #nsacyber
☆620Jan 7, 2024Updated 2 years ago
Alternatives and similar repositories for ELITEWOLF
Users that are interested in ELITEWOLF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MITRE Caldera™ for OT Plugins & Capabilities☆242Dec 22, 2025Updated 3 months ago
- Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC met…☆367Sep 11, 2025Updated 7 months ago
- Tools, tips, tricks, and more for exploring ICS Security.☆1,946Apr 15, 2025Updated last year
- Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)☆609Oct 29, 2025Updated 5 months ago
- A Low-cost ICS Security Testbed for Education and Research☆118Mar 16, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆92Updated this week
- Industrial Control Systems Network Protocol Parsers☆191Mar 10, 2026Updated last month
- Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in suppo…☆1,039Feb 24, 2020Updated 6 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,409Updated this week
- A packet capture visualizer for industrial control networks.☆56Dec 4, 2023Updated 2 years ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆199May 10, 2023Updated 2 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- Zeek OPCUA Binary Parser - CISA ICSNPP☆21Mar 3, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Advanced OPC-UA framework for vulnerability research & exploitation☆74Aug 9, 2023Updated 2 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 9 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Updated this week
- ICS security resources☆132May 7, 2025Updated 11 months ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆42May 30, 2024Updated last year
- ☆74Apr 3, 2025Updated last year
- Lists of products useful for ICS security☆108Jun 24, 2024Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,081Dec 11, 2024Updated last year
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆61Oct 17, 2023Updated 2 years ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆190Aug 22, 2025Updated 7 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆742May 19, 2023Updated 2 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,212Feb 20, 2026Updated last month
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆395Jan 20, 2026Updated 2 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,380Apr 8, 2026Updated last week
- A collection of ICS/SCADA PCAPs☆31Feb 6, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,496Feb 18, 2026Updated last month
- Zeek network security monitor plugin that enables parsing of the BACnet standard building controls protocol☆30Apr 23, 2025Updated 11 months ago
- Live Feed of C2 servers, tools, and botnets☆766Apr 6, 2026Updated last week
- A curated list of resources related to Industrial Control System (ICS) security.☆1,943Oct 10, 2025Updated 6 months ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- Automated Adversary Emulation Platform☆6,886Updated this week
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆374Mar 24, 2026Updated 3 weeks ago