CarlosLannister / IHSView external linksLinks
Industrial Hacking Simulator
☆27Jan 14, 2026Updated last month
Alternatives and similar repositories for IHS
Users that are interested in IHS are comparing it to the libraries listed below
Sorting:
- A high-interaction virtual honeypot for ICS that provides physical process simulation☆20May 10, 2024Updated last year
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆16Aug 3, 2022Updated 3 years ago
- ☆18Apr 26, 2022Updated 3 years ago
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆91Jun 19, 2024Updated last year
- ☆17Mar 21, 2019Updated 6 years ago
- Checking the status of Russian internet properties (via RIPE Atlas) being targeted by Ukraine's hacktivist "IT ARMY" Telegram group (and …☆18May 31, 2022Updated 3 years ago
- Website for Research Artifacts from the Security Community☆31Updated this week
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- A framework that help to create CTF Attack with Defense competition quickly☆27Oct 29, 2018Updated 7 years ago
- ☆30Jul 5, 2020Updated 5 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- Web for Pentester I☆10Sep 21, 2018Updated 7 years ago
- ☆33Jan 22, 2025Updated last year
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 5 years ago
- Damn Vulnerable Chemical Process - Tennessee Eastman☆80Dec 13, 2015Updated 10 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33May 18, 2022Updated 3 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Sep 2, 2021Updated 4 years ago
- Search and extract blob files on the Ethereum Blockchain network☆44Apr 3, 2021Updated 4 years ago
- A block-based programming environment for Arduino.☆16Jan 12, 2026Updated last month
- ☆10Jan 23, 2026Updated 3 weeks ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- Face Recognition & FindClone☆12Nov 16, 2020Updated 5 years ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 3 years ago
- RSMP Signal Exchange List (SXL) for Traffic Controllers☆12Dec 19, 2025Updated last month
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- a simple chat server for the esp8266.☆10May 19, 2021Updated 4 years ago
- The react website to provide live update link for coin master app☆15Feb 28, 2023Updated 2 years ago
- Continuous functions formalized in Lean4. A students project accompanied by a YouTube video.☆16Jul 10, 2025Updated 7 months ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- ☆10Feb 25, 2021Updated 4 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- WASP Research Arena for Software☆12Jun 10, 2022Updated 3 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- ☆14Dec 2, 2021Updated 4 years ago
- Data-flow Analysis Visualizer☆10Dec 9, 2021Updated 4 years ago