0xICF / SCADAShutdownTool
☆49Updated 5 years ago
Alternatives and similar repositories for SCADAShutdownTool:
Users that are interested in SCADAShutdownTool are comparing it to the libraries listed below
- List of default passwords for Industrial Control Systems☆71Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 5 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆104Updated 6 years ago
- Moki Distribution - ICS/SCADA Tools☆107Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- nse scripts for scada identification☆128Updated 11 years ago
- Scapy Penetration testing scripts☆22Updated 9 years ago
- PoC C&C for the Industroyer malware☆24Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Evading Snort Intrusion Detection System.☆76Updated 3 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆43Updated 9 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Industrial control Security Tool☆77Updated 3 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆43Updated 6 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- Industrial Control Systems Network Scanner☆23Updated 9 years ago
- scripts for pentesting☆88Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆68Updated 7 years ago
- Miscellaneous scripts for analyzing protocols and systems☆13Updated 8 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆61Updated 7 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 7 years ago
- Automatically exported from code.google.com/p/plcscan☆57Updated 9 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 11 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆61Updated 9 years ago