OT security monitoring #nsacyber
☆615Jan 7, 2024Updated 2 years ago
Alternatives and similar repositories for ELITEWOLF
Users that are interested in ELITEWOLF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MITRE Caldera™ for OT Plugins & Capabilities☆241Dec 22, 2025Updated 3 months ago
- Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC met…☆366Sep 11, 2025Updated 6 months ago
- Tools, tips, tricks, and more for exploring ICS Security.☆1,932Apr 15, 2025Updated 11 months ago
- Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)☆598Oct 29, 2025Updated 4 months ago
- A Low-cost ICS Security Testbed for Education and Research☆119Mar 16, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆92Updated this week
- Industrial Control Systems Network Protocol Parsers☆191Mar 10, 2026Updated 2 weeks ago
- Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in suppo…☆1,037Feb 24, 2020Updated 6 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,392Updated this week
- A packet capture visualizer for industrial control networks.☆55Dec 4, 2023Updated 2 years ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆198May 10, 2023Updated 2 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- Zeek OPCUA Binary Parser - CISA ICSNPP☆21Mar 3, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Advanced OPC-UA framework for vulnerability research & exploitation☆73Aug 9, 2023Updated 2 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 9 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆819Mar 6, 2026Updated 2 weeks ago
- ICS security resources☆132May 7, 2025Updated 10 months ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41May 30, 2024Updated last year
- ☆75Apr 3, 2025Updated 11 months ago
- Lists of products useful for ICS security☆108Jun 24, 2024Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,078Dec 11, 2024Updated last year
- The most average C2 ever (MACE)☆97Apr 9, 2022Updated 3 years ago
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆61Oct 17, 2023Updated 2 years ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆189Aug 22, 2025Updated 7 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆740May 19, 2023Updated 2 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,208Feb 20, 2026Updated last month
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆391Jan 20, 2026Updated 2 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,362Feb 19, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of ICS/SCADA PCAPs☆31Feb 6, 2020Updated 6 years ago
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,489Feb 18, 2026Updated last month
- Zeek network security monitor plugin that enables parsing of the BACnet standard building controls protocol☆30Apr 23, 2025Updated 11 months ago
- Live Feed of C2 servers, tools, and botnets☆760Updated this week
- A curated list of resources related to Industrial Control System (ICS) security.☆1,937Oct 10, 2025Updated 5 months ago
- ☆66Jul 16, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago