0xICF / ICScanner
Industrial Control Systems Network Scanner
☆23Updated 9 years ago
Alternatives and similar repositories for ICScanner:
Users that are interested in ICScanner are comparing it to the libraries listed below
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- Miscellaneous scripts for analyzing protocols and systems☆13Updated 8 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- PoC C&C for the Industroyer malware☆24Updated 7 years ago
- Modbus stager in assembly and some scripts to upload/download data to the holding register of a PLC☆42Updated 4 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- CANBus protection used to isolate third party systems requiring OBDII access.☆19Updated 10 years ago
- random scripts for random things☆13Updated 3 weeks ago
- Frontend for Codex Gigas☆21Updated 8 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆62Updated 8 years ago
- ☆29Updated 8 years ago
- A simple Nessus results viewer☆49Updated 11 years ago
- ICS/SCADA/PLC Discovery Tools Releases☆40Updated 10 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- ☆16Updated 10 years ago
- Modbus VCR☆27Updated 7 years ago
- ☆21Updated 9 years ago
- Source Code Intelligence☆30Updated 7 years ago
- List of scripts used for malware analysis☆15Updated 9 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Updated last year
- Parses Java Cache IDX files☆39Updated 7 years ago
- Simple DDE object detector☆56Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆17Updated 6 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆105Updated 7 years ago