CarlosLannister / IHSLinks
Industrial Hacking Simulator
☆27Updated last month
Alternatives and similar repositories for IHS
Users that are interested in IHS are comparing it to the libraries listed below
Sorting:
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆32Updated 7 months ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated 4 months ago
- Operational Technology Cyber Attack Database☆51Updated 3 years ago
- Public Code for ICS Evasion Attack Generation☆42Updated 4 years ago
- Low Interaction Mobile Honeypot☆95Updated 3 months ago
- Scripts and other tools to helps parse data or gather information☆66Updated 2 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- ICSSPLOIT (Industrial Control System Exploitation Framework),a exploitation framework based on Python☆56Updated 5 years ago
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆49Updated 7 months ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆16Updated 4 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆85Updated this week
- ☆27Updated 6 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆84Updated last year
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- EtherNet/IP & CIP Stack Detector☆47Updated 3 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆22Updated this week
- ICS TestBed Framework☆69Updated 6 years ago
- ☆112Updated 5 years ago
- Cloned from now gone Digitalbond page.☆15Updated 9 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- Easy to configure Honeypot for Blue Team☆44Updated 3 months ago
- ☆69Updated last month
- A Low-cost ICS Security Testbed for Education and Research☆116Updated last year
- Documentation and guidance to practice secure coding for various PLC vendors☆39Updated last year
- List of default passwords for Industrial Control Systems☆77Updated 8 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago