paulveillard / cybersecurity-industrial-control-systems-security
A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity.
☆27Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for cybersecurity-industrial-control-systems-security
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆37Updated 2 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆72Updated this week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 2 years ago
- Operational Technology Cyber Attack Database☆44Updated 2 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆15Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆43Updated 6 months ago
- ICS Security Labs☆34Updated 3 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆34Updated last year
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆11Updated 2 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆63Updated 5 months ago
- Industrial Hacking Simulator☆25Updated last week
- A Red Team Script to Detect Canary Tokens and Seed Files☆11Updated 10 months ago
- ICS security resources☆91Updated 3 weeks ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆25Updated 8 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆22Updated 3 years ago
- Sniffing out well-known threat groups☆28Updated 3 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆22Updated last year
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated 9 months ago
- Suricata rules for SCADA☆13Updated 2 years ago
- ☆16Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆25Updated last year
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆27Updated 2 months ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆10Updated 2 years ago
- ☆34Updated 6 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆16Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago