You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
ICS Incident Response Automation Framework Python framework for executing automated incident response playbooks in ICS/SCADA environments. Supports network isolation, forensic preservation, logic restoration, and safety system interventions. Designed for defenders, researchers, and red team simulations in operational technology networks.
An Industrial Control Systems (ICS), Internet of Things (IoT), and Operational Technology (OT) hardening framework offering security controls, implementation guides, and tools to protect operational technology environments.
ICS honeypot (Conpot) monitored with Suricata IDS. Includes custom Modbus rules, sample PCAPs, incident reports, and a reproducible lab environment for industrial control system cybersecurity research.
Environment for OT security research. Modbus log generation with ICS honeypot and emulated attacks. Anomaly-detection using deep learning algorithms (CNN, LSTM, Transformer).
An autonomous AI agent that monitors global vulnerability feeds (NVD), filters out IT noise using a 3-layer hybrid analysis engine, and delivers real-time, actionable intelligence on critical OT/ICS threats. Built with Python, OpenAI, and Streamlit.
A hybrid Golang/Python security auditing engine for industrial protocols (Modbus, S7Comm). Features automated configuration drift detection, NIST 800-82 compliance mapping, and a professional web-based risk dashboard.