CarlosLannister / IHSLinks
Industrial Hacking Simulator
☆27Updated 2 months ago
Alternatives and similar repositories for IHS
Users that are interested in IHS are comparing it to the libraries listed below
Sorting:
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆49Updated last month
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆32Updated 5 months ago
- ☆24Updated 5 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Low Interaction Mobile Honeypot☆94Updated 3 weeks ago
- Hashes of infamous malware☆26Updated 2 years ago
- Automatted Purple Team Script☆30Updated 4 years ago
- Easy to configure Honeypot for Blue Team☆41Updated 3 weeks ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆17Updated 6 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- ☆26Updated 6 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆34Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- ☆69Updated 9 months ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 2 years ago
- ☆33Updated 5 months ago
- Just another vulnerable web application.☆36Updated 11 months ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- Create visualization from Shodan query☆74Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago