sk4ld / gridpot
Open source tools for realistic-behaving electric grid honeynets
☆55Updated 10 years ago
Alternatives and similar repositories for gridpot:
Users that are interested in gridpot are comparing it to the libraries listed below
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- GasPot Released at Blackhat 2015☆139Updated 11 months ago
- ☆29Updated 8 years ago
- Triconex TriStation utilities and tools☆74Updated 6 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- Process HTTP Pcaps With YARA☆102Updated 11 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- nse scripts for scada identification☆129Updated 11 years ago
- Industrial Control Systems Network Scanner☆23Updated 9 years ago
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- ☆21Updated 9 years ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Updated 2 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Modbus VCR☆26Updated 7 years ago
- List of default passwords for Industrial Control Systems☆72Updated 8 years ago
- ☆50Updated 5 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆51Updated 6 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆27Updated 9 years ago
- A warehouse for your malware☆134Updated 11 years ago
- Industrial control Security Tool☆77Updated 4 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- malware-traffic-analysis.net PCAPs repository.☆35Updated 8 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- A set of ICS IDS rules for use with Suricata.☆49Updated last year
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago