Industrial Hacking Simulator
☆27Feb 21, 2026Updated 2 weeks ago
Alternatives and similar repositories for IHS
Users that are interested in IHS are comparing it to the libraries listed below
Sorting:
- A high-interaction virtual honeypot for ICS that provides physical process simulation☆20May 10, 2024Updated last year
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆92Jun 19, 2024Updated last year
- ☆17Mar 21, 2019Updated 6 years ago
- Checking the status of Russian internet properties (via RIPE Atlas) being targeted by Ukraine's hacktivist "IT ARMY" Telegram group (and …☆18May 31, 2022Updated 3 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Sep 26, 2019Updated 6 years ago
- ☆30Jul 5, 2020Updated 5 years ago
- A framework that help to create CTF Attack with Defense competition quickly☆27Oct 29, 2018Updated 7 years ago
- ☆29Dec 11, 2025Updated 2 months ago
- ☆34Jan 22, 2025Updated last year
- Damn Vulnerable Chemical Process - Tennessee Eastman☆80Dec 13, 2015Updated 10 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- High-interaction Honeypot for PLCs and Industrial Control Systems☆96May 16, 2023Updated 2 years ago
- Search and extract blob files on the Ethereum Blockchain network☆44Apr 3, 2021Updated 4 years ago
- Find gravitational wave signals from binary black hole collisions.☆18Mar 16, 2022Updated 3 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- RSMP Signal Exchange List (SXL) for Traffic Controllers☆12Dec 19, 2025Updated 2 months ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago
- Siemens Simatic S7 Metasploit Modules☆40Jul 14, 2012Updated 13 years ago
- A block-based programming environment for Arduino.☆16Jan 12, 2026Updated last month
- Repository of files for independent anti-phishing campaign, trusted information and more☆10May 14, 2020Updated 5 years ago
- This is an example of RSA encrypt/decrypt methods running on OP-TEE.☆11Sep 6, 2018Updated 7 years ago
- The react website to provide live update link for coin master app☆15Feb 28, 2023Updated 3 years ago
- a simple chat server for the esp8266.☆10May 19, 2021Updated 4 years ago
- Face Recognition & FindClone☆12Nov 16, 2020Updated 5 years ago
- Analysis and exploitation of an use-after-free in ProFTPd☆12Jun 21, 2023Updated 2 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- ☆11Mar 16, 2016Updated 9 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 7 years ago
- Free cybersecurity training resources☆12Feb 5, 2020Updated 6 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- DRSource is an extensible, multi-language static analysis tool designed to detect vulnerabilities in source code. It uses a pluggable arc…☆14Feb 27, 2026Updated last week
- A simple LKM kernel space rootkit for v5.x linux with multiple functions.☆10Aug 13, 2020Updated 5 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago