CarlosLannister / IHS
Industrial Hacking Simulator
☆25Updated last month
Alternatives and similar repositories for IHS:
Users that are interested in IHS are comparing it to the libraries listed below
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆28Updated last week
- Hashes of infamous malware☆25Updated last year
- All the useful tools interesting to be used☆23Updated 2 years ago
- ICS Security Labs☆34Updated 3 years ago
- CybatiWorks-1 ICS/SCADA/IoT/IT Cybersecurity Education Platform☆9Updated 9 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated last year
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated last month
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆69Updated 8 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆15Updated 4 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- Presentation Slides and Resources☆15Updated 8 months ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆17Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- ☆24Updated 5 years ago
- Repository resource threat intelligence for SOC☆10Updated 6 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆37Updated last year
- New Framework Red Team Operations☆17Updated 3 years ago
- Penguin OS Forensic (or Flight) Recorder☆39Updated last month
- A co-simulation framework for reasearching cybersecurity in power grids.☆20Updated 2 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 3 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- ☆18Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago