All Projects → CyberICS.github.io → Similar Projects or Alternatives

437 Open source projects that are alternatives of or similar to CyberICS.github.io

awesome-cloud-security
🛡️ Awesome Cloud Security Resources ⚔️
Stars: ✭ 1,056 (+3541.38%)
Mutual labels:  cybersecurity
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+200%)
Mutual labels:  cybersecurity
Cyber-Security
This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (+44.83%)
Mutual labels:  cybersecurity
ICS-Protocal-Detect-Nmap-Script
Some nmap scripts to detetct the infomations of the different ICS Here are 16 main ics protocal scan-scripts include Modbus, S7 and so on.
Stars: ✭ 21 (-27.59%)
Mutual labels:  ics
aurora
Malware similarity platform with modularity in mind.
Stars: ✭ 70 (+141.38%)
Mutual labels:  cybersecurity
Delphi SChannelTLS
Helper functions and socket classes to perform TLS communication by means of WinAPI (SChannel)
Stars: ✭ 22 (-24.14%)
Mutual labels:  ics
TcUnit-Runner
Program that makes it possible to automate runs of TcUnit unit tests
Stars: ✭ 23 (-20.69%)
Mutual labels:  plc
BTPS-SecPack
This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding a…
Stars: ✭ 33 (+13.79%)
Mutual labels:  cybersecurity
wtphm
SCADA data pre-processing library for prognostics, health management and fault detection of wind turbines. Successor to https://github.com/lkev/wt-fdd
Stars: ✭ 38 (+31.03%)
Mutual labels:  scada
EventTranscriptParser
Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-24.14%)
Mutual labels:  cybersecurity
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+193.1%)
Mutual labels:  cybersecurity
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+24844.83%)
Mutual labels:  cybersecurity
ICS LAB CMU 2016
CMU-CSAPP-LAB 原始文件+完成代码+文字攻略(过程记录手稿第一版)
Stars: ✭ 51 (+75.86%)
Mutual labels:  ics
humble
A humble, and fast, security-oriented HTTP headers analyzer
Stars: ✭ 17 (-41.38%)
Mutual labels:  cybersecurity
security-guidance
Security guidance from the MOJ Digital & Technology Cybersecurity team
Stars: ✭ 14 (-51.72%)
Mutual labels:  cybersecurity
mitrecnd.github.io
MITRE Shield website
Stars: ✭ 17 (-41.38%)
Mutual labels:  cybersecurity
iotagent-opcua
IoT Agent for OPC UA protocol
Stars: ✭ 28 (-3.45%)
Mutual labels:  industry
digital-copyright
Stamp your code with a trackable digital copyright
Stars: ✭ 17 (-41.38%)
Mutual labels:  cybersecurity
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (+375.86%)
Mutual labels:  cybersecurity
attack-evals
ATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+96.55%)
Mutual labels:  cybersecurity
SoftBeckhoff
Virtual Beckhoff PLC for local testing with docker support
Stars: ✭ 40 (+37.93%)
Mutual labels:  plc
ical2json
A simple node package to convert ical data to json
Stars: ✭ 46 (+58.62%)
Mutual labels:  ics
freeioe
FreeIOE is a framework for building IOE (Internet Of Everything) edge-computing gateway 开源的边缘计算网关框架. 讨论群: 291292378
Stars: ✭ 77 (+165.52%)
Mutual labels:  scada
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+889.66%)
Mutual labels:  cybersecurity
cycat-service
CyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-13.79%)
Mutual labels:  cybersecurity
s7client
Hi level API for node-snap7 to communication with Siemens S7 PLCs
Stars: ✭ 36 (+24.14%)
Mutual labels:  plc
moka7-live
S7 PLC communication library for Java, based on Moka7
Stars: ✭ 28 (-3.45%)
Mutual labels:  plc
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+189.66%)
Mutual labels:  cybersecurity
AutonomousThreatSweep
Threat Hunting queries for various attacks
Stars: ✭ 70 (+141.38%)
Mutual labels:  cybersecurity
adv-dnn-ens-malware
adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (+13.79%)
Mutual labels:  cybersecurity
weather-calendar-feed
Display yr.no weather (supports the entire Earth) forecasts with highly customizable Event titles in your Google Calendar, Android phone, iPhone, Outlook or other iCalendar app
Stars: ✭ 16 (-44.83%)
Mutual labels:  ics
TF6100 Samples
Contains product samples for TF6100 TC3 OPC UA
Stars: ✭ 15 (-48.28%)
Mutual labels:  plc
client-python
OpenCTI Python Client
Stars: ✭ 45 (+55.17%)
Mutual labels:  cybersecurity
recommendations-for-engineers
All of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 81 (+179.31%)
Mutual labels:  cybersecurity
connectors
OpenCTI connectors
Stars: ✭ 135 (+365.52%)
Mutual labels:  cybersecurity
node-red-contrib-FIWARE official
FIWARE-Node-Red integration supporting NGSI-LD
Stars: ✭ 14 (-51.72%)
Mutual labels:  industry
SentryPeer
A distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (+272.41%)
Mutual labels:  cybersecurity
ml-ai
ML-AI Community | Open Source | Built in Bharat for the World | Data science problem statements and solutions
Stars: ✭ 32 (+10.34%)
Mutual labels:  industry
Malware-Machine-Learning
Malware Machine Learning
Stars: ✭ 26 (-10.34%)
Mutual labels:  cybersecurity
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+1362.07%)
Mutual labels:  cybersecurity
log4j-detector
Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (+2044.83%)
Mutual labels:  cybersecurity
Practical Malware Analysis
Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Stars: ✭ 16 (-44.83%)
Mutual labels:  cybersecurity
QSimpleScada
Qt based simple SCADA framework, with dashboard, static and dynamic components
Stars: ✭ 152 (+424.14%)
Mutual labels:  scada
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+427.59%)
Mutual labels:  cybersecurity
know your ip
Know Your IP: Get location, blacklist status, shodan and censys results, and more.
Stars: ✭ 16 (-44.83%)
Mutual labels:  cybersecurity
linkedin-employee-scraper
Extract all employees from LinkedIn. Especially useful for companies with thousands of employees.
Stars: ✭ 16 (-44.83%)
Mutual labels:  cybersecurity
firecracker
Stop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+1410.34%)
Mutual labels:  cybersecurity
node-drivers
Industrial protocol drivers in node.js
Stars: ✭ 20 (-31.03%)
Mutual labels:  plc
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+158.62%)
Mutual labels:  cybersecurity
CTF-Write-UP
澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (-6.9%)
Mutual labels:  cybersecurity
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+141.38%)
Mutual labels:  cybersecurity
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-24.14%)
Mutual labels:  cybersecurity
ics2gcal
Import .ics files into Google Calendar with only two clicks.
Stars: ✭ 21 (-27.59%)
Mutual labels:  ics
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+941.38%)
Mutual labels:  cybersecurity
calcardbackup
calcardbackup: moved to https://codeberg.org/BernieO/calcardbackup
Stars: ✭ 67 (+131.03%)
Mutual labels:  ics
HostEnumerator
A tool that automates the process of enumeration
Stars: ✭ 29 (+0%)
Mutual labels:  cybersecurity
TheRoadOfSO
学习安全运营的记录 | The knowledge base of security operation
Stars: ✭ 286 (+886.21%)
Mutual labels:  cybersecurity
DEVGUIDE
CalConnect project to provide documentation on Calendaring and related issues.
Stars: ✭ 17 (-41.38%)
Mutual labels:  ics
prodcal ics
Производственный календарь в формате ics
Stars: ✭ 23 (-20.69%)
Mutual labels:  ics
sike-java
SIKE for Java is a software library that implements experimental supersingular isogeny cryptographic schemes that aim to provide protection against attackers running a large-scale quantum computer.
Stars: ✭ 28 (-3.45%)
Mutual labels:  cybersecurity
61-120 of 437 similar projects