utilsec / Industrial_ICS_OT_Cyber_Security_Resources
☆14Updated 8 months ago
Alternatives and similar repositories for Industrial_ICS_OT_Cyber_Security_Resources:
Users that are interested in Industrial_ICS_OT_Cyber_Security_Resources are comparing it to the libraries listed below
- ☆53Updated last year
- OT SIEM Lab for ICS networks.☆62Updated 2 weeks ago
- My personal OT resource list, gather throughout research and internet adventure.☆56Updated last week
- ☆43Updated last year
- My eBook with tips on how to get started in industrial (ICS/OT) cyber security.☆42Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆122Updated last year
- Operational Technology Cyber Attack Database☆47Updated 2 years ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated last year
- Creation of a laboratory for malware analysis in AWS☆92Updated 2 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆37Updated last year
- ICS Security Labs☆34Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated last year
- ☆165Updated 11 months ago
- SIEM Cheat Sheet☆73Updated last year
- ICS security resources☆94Updated 3 weeks ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆173Updated last year
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆12Updated 5 months ago
- Deny list generator for password filters☆25Updated 6 months ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆27Updated 5 months ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆73Updated this week
- Data from Dark Web Marketplace scraping - Be careful☆38Updated 3 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆151Updated 8 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last week
- ☆24Updated 2 months ago
- The Threat Actor Profile Guide for CTI Analysts☆104Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆75Updated 3 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆99Updated 2 years ago
- Windows Malware Investigation Scripts & Docs☆74Updated 3 months ago
- ☆99Updated last month