0xnkc / virtuepotView external linksLinks
A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.
☆16Sep 23, 2024Updated last year
Alternatives and similar repositories for virtuepot
Users that are interested in virtuepot are comparing it to the libraries listed below
Sorting:
- A high-interaction virtual honeypot for ICS that provides physical process simulation☆20May 10, 2024Updated last year
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆91Jun 19, 2024Updated last year
- ICS TestBed Framework☆69Jan 10, 2019Updated 7 years ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- Proof of concept python script for regreSSHion exploit.☆10Oct 19, 2024Updated last year
- The repository of Pentest-R1: Towards Autonomous Penetration Testing Reasoning Optimized via Two-Stage Reinforcement Learning.☆26Sep 8, 2025Updated 5 months ago
- It automatically picks OTP from sms. I implemented this without using any Flutter plugin.☆14Nov 15, 2022Updated 3 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆16May 17, 2016Updated 9 years ago
- 23–24 мая 2020 ⋅ Юниорские соревнования по информационной безопасности☆10Jun 14, 2020Updated 5 years ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- ☆15Sep 24, 2024Updated last year
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- Python script to check traffic between serial modbus RTU devices☆11Oct 31, 2020Updated 5 years ago
- MODBUS Penetration Testing Framework☆12Jul 2, 2017Updated 8 years ago
- ☆11Oct 30, 2024Updated last year
- This is a collaboration site of the Electric Power Research Institute (EPRI) for the Senior Design Program, advancing the substation simu…☆13May 8, 2018Updated 7 years ago
- ☆12Jun 4, 2025Updated 8 months ago
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- ☆12Nov 8, 2024Updated last year
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Everything related to YARA☆16Sep 9, 2025Updated 5 months ago
- Python and Fortran Numerical Implementations of the Polya Enumeration Theorem☆12Nov 9, 2016Updated 9 years ago
- DNP3 Cyber-attack datasets☆15Mar 9, 2017Updated 8 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- Docker Compose to deploy AmneziaWG services☆16Aug 15, 2024Updated last year
- Notes for the Cryptography course at Sapienza☆12Jun 24, 2020Updated 5 years ago
- An app highlighting how you can use the Highlight API☆15Dec 15, 2024Updated last year
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated last year
- Artifacts for our RAID 2023 paper, "Xunpack: Cross-Architecture Unpacking for Linux IoT Malware"☆15Oct 12, 2023Updated 2 years ago
- Trillium's - Master the art Of Necessary cybersecurity skills (T-MON)☆14Mar 27, 2024Updated last year
- ☆18Jan 21, 2026Updated 3 weeks ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated last year
- ☆15Nov 16, 2025Updated 2 months ago
- The RedHerring plugin is an extension for the CTFd platform that introduces a new type of challenge. It aims to promote fairness and prev…☆13Sep 6, 2023Updated 2 years ago
- A Simple RedLineStealer☆13Aug 30, 2023Updated 2 years ago
- ☆15Aug 3, 2023Updated 2 years ago
- Contains configuration files and scripts to perform Time-Sensitive Networking tests on a hardware testbed. Specifically the IEEE 802.1CB …☆13Jun 7, 2022Updated 3 years ago