UMASploit - ClearEnergy modules
☆16Apr 14, 2017Updated 8 years ago
Alternatives and similar repositories for ClearEnergy
Users that are interested in ClearEnergy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Modbus tap/tun tunneler, for making arbitrary ethernet connections over Modbus/TCP.☆12Dec 17, 2012Updated 13 years ago
- Modbus TCP vulnerability demonstration☆16Jan 22, 2020Updated 6 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 8 years ago
- modbus fuzzer based on boofuzz framework.!! Cool☆31Aug 10, 2025Updated 7 months ago
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Miscellaneous scripts for analyzing protocols and systems☆14Jun 24, 2016Updated 9 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆64Mar 1, 2017Updated 9 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆17Oct 24, 2020Updated 5 years ago
- ISAF aims to be a framework that provides the necessary tools for the correct security audit of industrial environments. This repo is a m…☆59Nov 13, 2023Updated 2 years ago
- Discover and enumerate all PLC devices and applications via a snap☆13May 28, 2018Updated 7 years ago
- Malmod☆14Jan 19, 2020Updated 6 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆110Mar 14, 2018Updated 8 years ago
- Small script to retrieve passwords from many types of Moxa device, including NPort, OnCell, MGate, etc.☆37Jan 17, 2017Updated 9 years ago
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆56Nov 30, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆13Oct 27, 2020Updated 5 years ago
- ☆14Nov 9, 2015Updated 10 years ago
- Real world and CTFs exploiting web/binary POCs.☆79Jul 5, 2020Updated 5 years ago
- Detect alive host and open port .☆17Dec 7, 2022Updated 3 years ago
- CANBus protection used to isolate third party systems requiring OBDII access.☆19Mar 18, 2015Updated 11 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- Source code for Modbus/TCP fuzzer used for ETFA 2015 paper☆21Feb 6, 2025Updated last year
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- Traffic captures between STEP7/WinCC and S7-300/S7-400 PLCs☆74Jun 10, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Damn Vulnerable Chemical Process - Vinyl Acetate Monomer☆22Dec 13, 2015Updated 10 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Nov 17, 2015Updated 10 years ago
- ICS/SCADA nmap script.☆18May 17, 2018Updated 7 years ago
- Forced set CIO data and Control Omron PLC CPU☆26Nov 10, 2015Updated 10 years ago
- Tools demonstrated at DEF CON 26 talk "Hacking PLCs and Causing Havoc on Critical Infrastructures"☆50Aug 10, 2018Updated 7 years ago
- ☆30Dec 4, 2021Updated 4 years ago
- epanetCPA is a MATLAB® toolbox for assessing the impacts of cyber-physical attacks on water distribution systems☆23Oct 7, 2020Updated 5 years ago
- Power of Community 2013 conference special release of ICS/SCADA toolkit☆88Nov 4, 2013Updated 12 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Snort rules☆35Nov 20, 2018Updated 7 years ago
- Metasploit Modules for OPC UA☆35Apr 2, 2020Updated 5 years ago
- Python / Scapy tool to analyze and interact with IEC 61850 Goose traffic☆37Dec 15, 2021Updated 4 years ago
- Public Code for ICS Evasion Attack Generation☆44Apr 23, 2021Updated 4 years ago
- SCADA network attack datasets and process logs☆20May 2, 2017Updated 8 years ago
- 针对大模型的后门攻击☆12Jun 30, 2024Updated last year
- splonebox - open source network assessment tool with focus on modularity☆24Dec 5, 2018Updated 7 years ago