Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
-
Updated
Feb 24, 2020 - Java
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
ICS/SCADA Security Resource(整合工控安全相关资源)
A curated list of tools related to Industrial Control System (ICS) security and Penetration Testing
Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware
stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Samples,Fanny Added in another repo.
Collection of writeups on ICS/SCADA security.
GRFICSv3 is a FREE and open source OT security lab with realistic networking and a 3D process simulation for training and learning ICS security
well done command-cheatsheet for certificate exam
Real world and CTFs exploiting web/binary POCs.
List of some cybersecurity conferences
Embedded AppSec Best Practices
This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-attacks) in SCADA water infrastructure.
A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity.
Grassmarlin replacement. Open-source multi-user ICS/SCADA passive network discovery and topology platform. Upload PCAPs, visualize OT networks, generate assessment reports. Flask + Docker. The open-source engine behind Fathom.
A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).
ICS Incident Response Automation Framework Python framework for executing automated incident response playbooks in ICS/SCADA environments. Supports network isolation, forensic preservation, logic restoration, and safety system interventions. Designed for defenders, researchers, and red team simulations in operational technology networks.
Suricata rules for SCADA
All-in-one ICS/SCADA hacking, red teaming, malware analysis, detection, and lab architecture cheat sheet
Comprehensive methodology, checklists, and hardening guides for ICS/OT Cybersecurity Audits based on IEC 62443 & NIST SP 800-82. Focus on defensive security practices and risk mitigation in industrial environments.
Multi-protocol ICS security scanner detecting vulnerabilities in Modbus, S7, DNP3, BACnet, MQTT & SNMP. Features configurable scan intensities, safe-by-default operation & comprehensive reporting. Identifies misconfigurations & security flaws in industrial environments.
Add a description, image, and links to the scada-security topic page so that developers can more easily learn about it.
To associate your repository with the scada-security topic, visit your repo's landing page and select "manage topics."