CarlosLannister / IHSLinks
Industrial Hacking Simulator
☆27Updated 3 weeks ago
Alternatives and similar repositories for IHS
Users that are interested in IHS are comparing it to the libraries listed below
Sorting:
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆31Updated 3 months ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- CybatiWorks-1 ICS/SCADA/IoT/IT Cybersecurity Education Platform☆9Updated 10 years ago
- ICSSPLOIT (Industrial Control System Exploitation Framework),a exploitation framework based on Python☆54Updated 5 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated 2 weeks ago
- Public Code for ICS Evasion Attack Generation☆42Updated 4 years ago
- ☆24Updated 5 years ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆17Updated 6 years ago
- ☆25Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Presentation Slides and Resources☆16Updated 11 months ago
- ICS Security Labs☆36Updated 4 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆16Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Hashes of infamous malware☆26Updated last year
- Documentation and guidance to practice secure coding for various PLC vendors☆37Updated last year
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- EtherNet/IP & CIP Stack Detector☆45Updated 2 years ago
- Cloned from now gone Digitalbond page.☆15Updated 8 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- All the useful tools interesting to be used☆23Updated 2 years ago
- The New Hacking Framework☆18Updated 8 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago