ControlThings-io / ctuiLinks
ctui is a library similar to Python's cmd, but with curses-like user interface
☆30Updated last year
Alternatives and similar repositories for ctui
Users that are interested in ctui are comparing it to the libraries listed below
Sorting:
- A security professional's swiss army knife for interacting with raw serial devices☆29Updated last year
- An assessment tool to interact with Velocio PLCs☆13Updated 3 years ago
- A tool to interact with the Modbus protocols☆79Updated last year
- Scripts and other tools to helps parse data or gather information☆66Updated 2 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆184Updated 3 months ago
- Lists of products useful for ICS security☆106Updated last year
- Sample files for Control Things Platform☆40Updated 2 months ago
- Industrial Control Systems Network Protocol Parsers☆177Updated last week
- A packet capture visualizer for industrial control networks.☆55Updated last year
- ICS security resources☆108Updated 3 months ago
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆57Updated 4 years ago
- A Low-cost ICS Security Testbed for Education and Research☆115Updated last year
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆84Updated last week
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆253Updated 2 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- an awesome list of active defense resources☆124Updated 5 years ago
- EtherNet/IP & CIP Stack Detector☆47Updated 3 years ago
- ICS Security Labs☆37Updated 4 years ago
- The SCADA Simulator is a configurable system that presents itself as a SCADA system within an exercise environment. It has a web-accessib…☆140Updated 4 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 3 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆93Updated 4 years ago
- Operational Technology Cyber Attack Database☆49Updated 3 years ago
- Advanced OPC-UA framework for vulnerability research & exploitation☆59Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated this week
- This is the ICSSIM source code and user manual for simulating industrial control system testbed for cybersecurity experiments☆82Updated last year
- Beer-ISAC Community Resources