Industrial Hacking Simulator
☆27Feb 21, 2026Updated last month
Alternatives and similar repositories for IHS
Users that are interested in IHS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Apr 26, 2022Updated 3 years ago
- High-interaction Honeypot for PLCs and Industrial Control Systems☆97May 16, 2023Updated 2 years ago
- Website for Research Artifacts from the Security Community☆31Updated this week
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆93Jun 19, 2024Updated last year
- UIAccess UAC Bypass using token duplication and keyboard events☆27Sep 26, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- Anti Shoulder Surfing Attack Platform (ASSAP)☆23Oct 5, 2023Updated 2 years ago
- ☆30Jul 5, 2020Updated 5 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- A Low-cost ICS Security Testbed for Education and Research☆118Mar 16, 2024Updated 2 years ago
- Automatically exported from code.google.com/p/plcscan☆110Apr 7, 2023Updated 3 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- An tool for search IOT MQTT vulnerable with shodan☆21Sep 15, 2017Updated 8 years ago
- ☆16Dec 4, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆99Aug 8, 2015Updated 10 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 5 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 5 years ago
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆15Feb 7, 2022Updated 4 years ago
- ☆14Nov 10, 2019Updated 6 years ago
- Jekyll template for simple workshop website, Bootstrap version☆11Sep 22, 2025Updated 6 months ago
- MiniCPS: a framework for Cyber-Physical Systems real-time simulation, built on top of mininet☆194Sep 19, 2025Updated 6 months ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- Siemens Simatic S7 Metasploit Modules☆41Jul 14, 2012Updated 13 years ago
- ADCS simulations for the AcubeSAT nanosatellite☆15Oct 6, 2025Updated 6 months ago
- ☆14Dec 27, 2020Updated 5 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- Dragonfire is an open source virtual assistant project for RaspberryPi OSMC/Kodi☆17May 18, 2017Updated 8 years ago
- WASP Research Arena for Software☆12Jun 10, 2022Updated 3 years ago
- ☆12Jun 14, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Repository for tools used for the OSCP☆24Sep 18, 2025Updated 6 months ago
- ☆13Oct 14, 2017Updated 8 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 4 years ago
- This project was conducted by the 10th KITRI BoB (Best of the Best), and recorded what we have done for vulnerability analysis of drones.☆11Dec 30, 2021Updated 4 years ago
- MultiZone® Trusted Firmware is the quick and safe way to build secure IoT applications with any RISC-V processor. It provides secure acce…☆20Jan 22, 2024Updated 2 years ago
- A framework that help to create CTF Attack with Defense competition quickly☆27Oct 29, 2018Updated 7 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago