0xICF / SCADAShutdownToolLinks
☆50Updated 5 years ago
Alternatives and similar repositories for SCADAShutdownTool
Users that are interested in SCADAShutdownTool are comparing it to the libraries listed below
Sorting:
- Moki Distribution - ICS/SCADA Tools☆109Updated 7 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆106Updated 7 years ago
- nse scripts for scada identification☆130Updated 11 years ago
- List of default passwords for Industrial Control Systems☆73Updated 8 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Updated 8 years ago
- Industrial control Security Tool☆77Updated 4 years ago
- Industrial Control Systems Network Scanner☆23Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆63Updated 8 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- PoC C&C for the Industroyer malware☆25Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆117Updated 6 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 11 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Modbus VCR☆27Updated 7 years ago
- Automatically exported from code.google.com/p/plcscan☆58Updated 10 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- a collection of payloads for common webapps☆73Updated 12 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆64Updated 9 years ago
- PoC implementation of the POODLE attack☆68Updated 10 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 9 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago