Cisco-Talos / oil-pumpjackView external linksLinks
Oil Pumpjack: open source materials to create your own oil pumpjack managed by an Arduino
☆35Feb 11, 2019Updated 7 years ago
Alternatives and similar repositories for oil-pumpjack
Users that are interested in oil-pumpjack are comparing it to the libraries listed below
Sorting:
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 8 years ago
- ICS TestBed Framework☆69Jan 10, 2019Updated 7 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Apr 24, 2023Updated 2 years ago
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- Wireshark dissector for wirelessHART☆13Aug 2, 2017Updated 8 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- Material from ICS Village talk at DEFCON 25☆12Jul 30, 2018Updated 7 years ago
- DNP3 Cyber-attack datasets☆15Mar 9, 2017Updated 8 years ago
- Tools to interact with Siemens PLCs☆13Aug 23, 2023Updated 2 years ago
- ☆13Oct 27, 2020Updated 5 years ago
- Tool for exploiting sixnet RTUs☆16Mar 15, 2018Updated 7 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Masters of IT project, network attacks against Profinet SCADA systems.☆31Sep 15, 2016Updated 9 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆30May 30, 2024Updated last year
- Modbus tap/tun tunneler, for making arbitrary ethernet connections over Modbus/TCP.☆12Dec 17, 2012Updated 13 years ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 4 months ago
- ☆13Apr 30, 2016Updated 9 years ago
- Kali Linux fresh installation setup scripts.☆14Feb 10, 2017Updated 9 years ago
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Nov 19, 2025Updated 2 months ago
- Public Code for ICS Evasion Attack Generation☆44Apr 23, 2021Updated 4 years ago
- A Low-cost ICS Security Testbed for Education and Research☆119Mar 16, 2024Updated last year
- Scapy hands-on at #GreHack16☆15Nov 19, 2016Updated 9 years ago
- Damn Vulnerable Chemical Process - Tennessee Eastman☆80Dec 13, 2015Updated 10 years ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41May 30, 2024Updated last year
- Security Onion Elastic Stack☆46Feb 1, 2021Updated 5 years ago
- ☆44Sep 12, 2018Updated 7 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago
- SCADA network attack datasets and process logs☆20May 2, 2017Updated 8 years ago
- ☆31Feb 15, 2017Updated 8 years ago
- Talos Decryptor POC for Remcos RAT version 2.0.5 and earlier☆24Aug 2, 2018Updated 7 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 2 months ago
- EtherNet/IP & CIP Stack Detector☆49Aug 4, 2022Updated 3 years ago
- Operational Technology (OT) Simulator☆54Oct 6, 2025Updated 4 months ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆86May 22, 2023Updated 2 years ago
- Passive ICS Network Scanner based on MAC Address Detection☆21Oct 26, 2020Updated 5 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago