How can a comprehensive, primarily open-source cyber hunt kit with specialized ICS/SCADA tools, knowledge dashboards, and adversary TTP-focused playbooks be developed to enable effective and low-risk threat hunting on industrial control system networks?