ControlThings-io / ctserial
A security professional's swiss army knife for interacting with raw serial devices
☆28Updated last year
Alternatives and similar repositories for ctserial:
Users that are interested in ctserial are comparing it to the libraries listed below
- A tool to interact with the Modbus protocols☆74Updated last year
- An assessment tool to interact with Velocio PLCs☆13Updated 3 years ago
- Scripts and other tools to helps parse data or gather information☆66Updated 2 years ago
- Sample files for Control Things Platform☆38Updated last year
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- ICS Security Labs☆35Updated 4 years ago
- EtherNet/IP & CIP Stack Detector☆45Updated 2 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆179Updated last week
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆56Updated 4 years ago
- ctui is a library similar to Python's cmd, but with curses-like user interface☆29Updated last year
- Lists of products useful for ICS security☆104Updated 10 months ago
- A Low-cost ICS Security Testbed for Education and Research☆113Updated last year
- Simulation of Industrial process unit on ESP32 board with ModbusTCP interface☆21Updated 4 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆81Updated last week
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆41Updated 4 years ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆11Updated 4 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Claroty's Public Tools☆38Updated 5 years ago
- ICS security resources☆100Updated last month
- CybatiWorks-1 ICS/SCADA/IoT/IT Cybersecurity Education Platform☆9Updated 9 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆29Updated 7 months ago
- Cloned from now gone Digitalbond page.☆15Updated 8 years ago
- Intrusion Detection Honeypots Book Code☆25Updated 4 years ago
- Defensive Origins Training Schedule☆38Updated last year
- All my slides for any talks☆23Updated 6 months ago
- Operational Technology Cyber Attack Database☆49Updated 2 years ago
- A packet capture visualizer for industrial control networks.☆53Updated last year
- Tool used to perform threat intelligence against packet data☆35Updated 2 months ago