APTnotes
awesome-industrial-control-system-security
Our great sponsors
APTnotes | awesome-industrial-control-system-security | |
---|---|---|
5 | 7 | |
3,406 | 1,494 | |
- | - | |
3.1 | 2.9 | |
4 months ago | 6 months ago | |
Python | ||
- | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
APTnotes
-
Ask HN: What Happened with the Grugq Article?
>with case studies and getting as niche on specific things as possible.
Then definitely you can touch on APT marketplace, unlike the usual zeroday ones, those are -as the name implies, advanced, and mostly are state sponsored, you can find some of these in this sheet [1], or other sources [2] or older ones [3]. Now, for other zero day exploits, you can dig into your typical threat intelligence feeds to have an idea, some of these are daily updated [4] [5] [6] among a lot more of other resources, there are also underground databases for zero day and even APT updated as of yesterday, and also online marketplaces for those where you can buy/sell compromised RDP servers / webmail / cPanels / etc., or even services like smtp-sms for phishing among others, unfortunately, I can’t and won’t list any of these in here for obvious reasons, however, if you dig a little deeper definitely you will find something, just don’t use the usual search engines and normal channels, and get the usual security precautions like sandbox/vpns/etc. when access any of these sites, preferably in an isolated OS too.
And thanks, not expert enough for sure!
[1] https://docs.google.com/spreadsheets/u/1/d/1H9_xaxQHpWaa4O_S...
[2] https://gist.github.com/Neo23x0/c4f40629342769ad0a8f3980942e...
[3] https://github.com/kbandla/APTnotes
[4] https://bazaar.abuse.ch/browse/
[5] https://www.exploitalert.com/browse-exploit.html
[6] https://threatfox.abuse.ch/browse/
-
Seeking Datasets on Malware
I trained up this repo in my privateGPT - https://github.com/kbandla/APTnotes
- Le Burkina Faso
-
Cybersecurity Repositories
APT Notes
- Les ressortissants russes en France reçoivent en ce moment sur leurs numéros de téléphone russe des demandes pour l'enrôlement dans l'armée en vue de la guerre avec l'Ukraine
awesome-industrial-control-system-security
-
Cybersecurity Repositories
Industrial Control System Security InfoSec
-
Operational technology cybersecurity? certs? study? paths?
This list of resources
- About Russia's Industrial Control System Attacks...
-
OT IT
Find plenty of tools & docs at https://github.com/hslatman/awesome-industrial-control-system-security
-
Awesome Penetration Testing
See also awesome-industrial-control-system-security.
- ICS-PCAP file
-
Are there any hack labs to practice on for ICS/SCADA security?
https://github.com/hslatman/awesome-industrial-control-system-security (additional lab/sim approaches)
What are some alternatives?
data - APTnotes data
ICS-pcap - A collection of ICS/SCADA PCAPs
ThreatHunter-Playbook - A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Scada-LTS - Scada-LTS is an Open Source, web-based, multi-platform solution for building your own SCADA (Supervisory Control and Data Acquisition) system.
awesome-ctf - A curated list of CTF frameworks, libraries, resources and softwares
AutoSploit - Automated Mass Exploiter
osx-and-ios-security-awesome - OSX and iOS related security tools
SigPloit
awesome-adversarial-machine-learning - A curated list of awesome adversarial machine learning resources
blackarch - An ArchLinux based distribution for penetration testers and security researchers.
Awesome Cryptography - A curated list of cryptography resources and links.
routersploit - Exploitation Framework for Embedded Devices [Moved to: https://github.com/threat9/routersploit]