GridPot is a cybersecurity tool that integrates GridLAB-D, Conpot, and libiec61850 to simulate and detect attacks on industrial control systems (ICS). Dependencies: autconf, automake, libtool, subversion, python-dev, mysql-server, python-mysqldb, xerces-c, libcurl. Setup: Install MySQL, set up Conpot with 'sudo make clean' and 'sudo python setup.py install', set up GridLAB-D with 'autoreconf -isf', 'make', 'sudo make install', set up libiec61850 with 'make' and 'make INSTALL_PREFIX=/usr/local install'. Demo: Run demo commands for GridLAB-D and Conpot. Developer Links: For more information on interacting with GridLAB-D objects from Conpot, visit http://gridlab-d.sourceforge.net/wiki/index.php/Power_Flow_User_Guide
FEATURES
SIMILAR TOOLS
Open-source rules for detecting and preventing email attacks like BEC, malware, and credential phishing.
An Outlook add-in for reporting suspicious emails to security teams and tracking user behavior during awareness campaigns.
A spam prevention technique using hidden fields to detect and deter spam bots in Laravel applications.
A platform that provides visibility and security monitoring of hardware, firmware, and software components in IT infrastructure to identify supply chain risks and vulnerabilities.
NotRuler is a tool for Exchange Admins to detect client-side Outlook rules and VBScript enabled forms, aiding in the detection of attacks created through Ruler.
A security checklist app for your Mac that helps you with basic security hygiene and prevents 80% of problems.
A cross-platform software library for interacting with iOS devices without jailbreaking.
A comprehensive collection of wordlists for bruteforcing and password cracking, covering various hashing algorithms and sizes.
Android vulnerability analysis system with efficient scanning and high accuracy.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.