0xICF / SCADAShutdownToolLinks
☆51Updated 6 years ago
Alternatives and similar repositories for SCADAShutdownTool
Users that are interested in SCADAShutdownTool are comparing it to the libraries listed below
Sorting:
- nse scripts for scada identification☆131Updated 12 years ago
- Moki Distribution - ICS/SCADA Tools☆113Updated 8 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆108Updated 8 years ago
- Industrial control Security Tool☆78Updated 4 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆63Updated 8 years ago
- Industrial Control Systems Network Scanner☆23Updated 10 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆110Updated 7 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Updated 9 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- ☆31Updated 8 years ago
- GasPot Released at Blackhat 2015☆144Updated last year
- List of default passwords for Industrial Control Systems☆78Updated 8 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 9 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 7 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- Car Backdoor Maker☆220Updated 7 years ago
- Telnet Honeypot☆163Updated 6 years ago
- Tools that are related to pentest and network security☆97Updated 4 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97Updated 7 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 10 years ago
- PoC C&C for the Industroyer malware☆26Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Updated 7 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 10 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 7 years ago
- Just random files I've stored here for people to get access to because wordpress doesn't like python.☆83Updated 3 years ago
- PoC implementation of the POODLE attack☆69Updated 10 years ago
- Open source tools for realistic-behaving electric grid honeynets☆59Updated 10 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆247Updated 11 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆115Updated 6 years ago