0xICF / SCADAShutdownToolLinks
☆50Updated 6 years ago
Alternatives and similar repositories for SCADAShutdownTool
Users that are interested in SCADAShutdownTool are comparing it to the libraries listed below
Sorting:
- nse scripts for scada identification☆131Updated 11 years ago
- Moki Distribution - ICS/SCADA Tools☆110Updated 7 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆106Updated 8 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆63Updated 8 years ago
- Vulnerability scanner based on vulners.com audit API☆64Updated 6 years ago
- List of default passwords for Industrial Control Systems☆75Updated 8 years ago
- Industrial control Security Tool☆77Updated 4 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 11 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆107Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- penetration testing scripts☆136Updated 5 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 5 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- Evading Snort Intrusion Detection System.☆78Updated 3 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Updated 9 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 9 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- SpiderLabs shared Nmap Tools☆229Updated 4 years ago
- PoC C&C for the Industroyer malware☆25Updated 8 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆121Updated last year
- Database of websites for penetration testing☆176Updated 5 years ago
- Tools that are related to pentest and network security☆99Updated 4 years ago