Investigating the Viability of Fingerprinting the Toolset Used to Probe an Operational Technology Network, Providing Another Indicative Vector to Use in Intrusion Detection Systems.
-
Updated
Feb 15, 2021 - HTML
Investigating the Viability of Fingerprinting the Toolset Used to Probe an Operational Technology Network, Providing Another Indicative Vector to Use in Intrusion Detection Systems.
CPS & IoT security labs (UniPD)
✨ NaInSec Special Repository ✨
Code that I have written/modified in multiple programming languages .
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, MALICIOUS GOOSE packets, and benign SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
The Datasets contain a wide variety of network and physical behaviours of an IEC-61850-compliant zone substation. The datasets are compatible with actual substation network traffic, including benign GOOSE packets, benign SV packets, and MALICIOUS SV packets. The datasets consist of two versions, including raw datasets and labelled datasets.
OT Early Warning System or Rust TCP Port Scanner and Listener Application
A simple high-level Python interface for the Dragos portal API
A collection of scripts focusing on simulating a small ICS and conducting security assessments on it.
ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
NGFW stands for network gateway firewall this is mainly designed for iot and ICS environments the project still in blue prints
A tool for gathering IT/OT exposed assets on the Internet and sending the results to a MISP instance for further Threat Intelligence analysis.
A formally verified implementation of a bolt-on security device for ICS networks. Designed with TLA+ and written/proved in F*
JSON file that contains an update metadata of Automation Protocols (Industrial control system, process automation, building automation, automatic meter reading, and automobile)
This repository collects the default password of ICS web login, and it's used to Brute Force.
Simple and automated way of gathering alerts about vulnerabilities and threats regarding ICS/SCADA reported by CISA.
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
Modbus TCP vulnerability demonstration
Secure SCADA Protocol 21 Specification
Suricata rules for SCADA
Add a description, image, and links to the ics-security topic page so that developers can more easily learn about it.
To associate your repository with the ics-security topic, visit your repo's landing page and select "manage topics."