utilsec / Getting_Started_with_ICS
My eBook with tips on how to get started in industrial (ICS/OT) cyber security.
☆40Updated last year
Alternatives and similar repositories for Getting_Started_with_ICS:
Users that are interested in Getting_Started_with_ICS are comparing it to the libraries listed below
- ☆42Updated last year
- ☆49Updated last year
- ☆55Updated 3 years ago
- ☆160Updated 10 months ago
- SIEM Cheat Sheet☆73Updated last year
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆173Updated last year
- Some important DFIR Resources☆83Updated last year
- Tools for simulating threats☆180Updated last year
- ☆14Updated 7 months ago
- Some of the tools we use during vCISO engagements☆15Updated 2 years ago
- Windows Malware Investigation Scripts & Docs☆75Updated 2 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆111Updated last year
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆214Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆178Updated 6 months ago
- ☆67Updated 5 months ago
- ☆45Updated last month
- MISP Playbooks☆182Updated last month
- Unlock the power of Splunk SIEM for comprehensive log analysis. Collaborate and innovate with our Splunk Log Analysis Projects on GitHub☆103Updated 7 months ago
- A cybersecurity game in Azure Data Explorer☆165Updated 6 months ago
- Automating Security Detection Engineering, published by Packt☆52Updated 3 months ago
- ☆27Updated last month
- A collection of various SIEM rules relating to malware family groups.☆64Updated 7 months ago
- A list of Splunk queries that I've collected and used over time.☆74Updated 4 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆57Updated 3 months ago
- ☆94Updated this week
- Security Scripts and Sources for daily usage.☆51Updated this week
- Threat Hunting with Elastic Stack, Published by Packt☆38Updated 2 years ago
- Indexes for SANS Courses and GIAC Certifications☆236Updated 7 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆116Updated 5 months ago