smod is a modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol
☆19May 2, 2019Updated 6 years ago
Alternatives and similar repositories for smod
Users that are interested in smod are comparing it to the libraries listed below
Sorting:
- ☆17Sep 8, 2015Updated 10 years ago
- An android binder library for rust☆21Updated this week
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- https://github.com/aligungr/UERANSIM☆10Apr 23, 2021Updated 4 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- ☆12Apr 1, 2025Updated 11 months ago
- ACI-GetStarted☆11Jun 4, 2025Updated 8 months ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- ☆20Updated this week
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- ☆10Dec 26, 2023Updated 2 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 5 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- ☆10Jan 3, 2023Updated 3 years ago
- icml24☆14Feb 24, 2025Updated last year
- FortifyPatch: Towards Tamper-resistant Live Patching in Linux-based Hypervisor.☆17Sep 22, 2025Updated 5 months ago
- ☆11Aug 10, 2021Updated 4 years ago
- ☆15Jan 5, 2024Updated 2 years ago
- ReasoningShield: Safety Detection over Reasoning Traces of Large Reasoning Models☆25Sep 27, 2025Updated 5 months ago
- stm8 ida processor module☆13Nov 9, 2021Updated 4 years ago
- Device Tree Compiler for Windows☆15Aug 9, 2024Updated last year
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- ☆13Dec 6, 2020Updated 5 years ago
- Scalability-First Pointer Analysis with Self-Tuning Context-Sensitivity☆11Jul 2, 2023Updated 2 years ago
- Material from ICS Village talk at DEFCON 25☆12Jul 30, 2018Updated 7 years ago
- ☆10Jun 11, 2018Updated 7 years ago