0xICF / SCADAShutdownToolLinks
☆50Updated 6 years ago
Alternatives and similar repositories for SCADAShutdownTool
Users that are interested in SCADAShutdownTool are comparing it to the libraries listed below
Sorting:
- nse scripts for scada identification☆130Updated 11 years ago
- List of default passwords for Industrial Control Systems☆73Updated 8 years ago
- Moki Distribution - ICS/SCADA Tools☆110Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Industrial control Security Tool☆77Updated 4 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆106Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 11 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆63Updated 8 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Updated 9 years ago
- Modbus VCR☆27Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆117Updated 6 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- Reconnaissance scripts for penetration testing☆58Updated 9 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Vulnerability scanner based on vulners.com audit API☆64Updated 6 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆96Updated 2 years ago
- a collection of payloads for common webapps☆73Updated 12 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 9 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 7 years ago
- ProFTPD IAC Remote Root Exploit☆37Updated 7 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Industrial Control Systems Network Scanner☆23Updated 9 years ago