utilsec / Industrial_ICS_OT_Cyber_Security_ResourcesLinks
☆16Updated last year
Alternatives and similar repositories for Industrial_ICS_OT_Cyber_Security_Resources
Users that are interested in Industrial_ICS_OT_Cyber_Security_Resources are comparing it to the libraries listed below
Sorting:
- ☆63Updated 2 years ago
- ☆52Updated 2 years ago
- My eBook with tips on how to get started in industrial (ICS/OT) cyber security.☆68Updated 2 years ago
- OT Security Lab for ICS networks☆553Updated last week
- My personal OT resource list, gather throughout research and internet adventure.☆116Updated last month
- ICS Security Labs☆38Updated 4 years ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆28Updated last year
- ICS security resources☆115Updated 6 months ago
- BusPwn V1.0 is a powerful Modbus hacking framework designed for testing and exploiting vulnerabilities in Modbus-based systems commonly f…☆25Updated 7 months ago
- Operational Technology Cyber Attack Database☆51Updated 3 years ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆195Updated 2 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆135Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- Collection of writeups on ICS/SCADA security.☆188Updated last month
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆167Updated 3 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆230Updated this week
- ☆188Updated last year
- ☆201Updated 10 months ago
- Documentation and guidance to practice secure coding for various PLC vendors☆40Updated 2 years ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆40Updated last year
- Knowledge base on cybercriminal concealment techniques☆80Updated 6 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆268Updated 5 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆172Updated 3 weeks ago
- This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.☆76Updated 2 months ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆44Updated 2 years ago
- Deny list generator for password filters☆26Updated last year
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆140Updated last year
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13Updated 5 months ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Updated last week