Stars
Find my latest publications and the latest information about industrial cybersecurity
Tools, tips, tricks, and more for exploring ICS Security.
PowerShell script for hardening Siemens Simatic PCS 7 servers
APT & CyberCriminal Campaign Collection
This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant yara rules and ids signatures to detect these indicators.
A set of ICS IDS rules for use with Suricata.
A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.
SCADA StrangeLove Default/Hardcoded Passwords List
Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware
APT & CyberCriminal Campaign Collection
A list of information security companies that offer penetration testing services and/or other offensive red side orientated services at any level in Australia and New Zealand.
Code written as part of our various malware investigations
Indicators of Compromises (IOC) of our various investigations
A Python based parser for Microsoft Access database files