nsacyber / GRASSMARLIN
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
☆972Updated 5 years ago
Alternatives and similar repositories for GRASSMARLIN
Users that are interested in GRASSMARLIN are comparing it to the libraries listed below
Sorting:
- ICS/SCADA honeypot☆1,330Updated 4 months ago
- Tools, tips, tricks, and more for exploring ICS Security.☆1,754Updated last month
- Digital Bond's ICS Enumeration Tools☆447Updated 5 years ago
- A collection of ICS/SCADA PCAPs☆478Updated 5 years ago
- ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python☆1,062Updated last year
- Suricata, Snort and Zeek IDS rule and pcap testing system☆477Updated 4 months ago
- An information security preparedness tool to do adversarial simulation.☆1,122Updated 6 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,753Updated last year
- Graphical Realism Framework for Industrial Control Simulations☆220Updated 10 months ago
- ☆1,073Updated 6 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,591Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,884Updated 10 months ago
- Cyber Analytics Repository☆937Updated this week
- APTnotes data☆1,708Updated 5 months ago
- Utilities for MITRE™ ATT&CK☆1,028Updated 11 months ago
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆144Updated 4 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,118Updated this week
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,156Updated last year
- CRITs - Collaborative Research Into Threats☆901Updated 5 years ago
- A Powershell incident response framework☆1,601Updated 2 years ago
- PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highli…☆1,723Updated 3 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,306Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated 10 months ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆917Updated last year
- An informational repo about hunting for adversaries in your IT environment.☆1,775Updated 3 years ago
- Re-play Security Events☆1,641Updated last year
- Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware☆237Updated 4 years ago
- Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)☆493Updated 2 years ago