Simulating Industrial IoT with IGSS SCADA and Rasberry Pi, Attacking and fixing potential vulnerabilities
☆13Jun 7, 2020Updated 5 years ago
Alternatives and similar repositories for IIoT-Simulation-And-Security
Users that are interested in IIoT-Simulation-And-Security are comparing it to the libraries listed below
Sorting:
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Apr 24, 2023Updated 2 years ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 9 months ago
- ☆15Apr 8, 2025Updated 11 months ago
- Starting point example project in Java for the AWS IoT service to be used on a Rasberry Pi or any internet connectivity capable device wi…☆11Apr 2, 2018Updated 7 years ago
- A script to generate the Hackers Against Humanity deck.☆13Jan 21, 2024Updated 2 years ago
- MATLAB WSN Code for a wsn find a shotestpath between two nodes (source and target) and starts sending data till one node involved in rout…☆19Nov 28, 2019Updated 6 years ago
- This code optimizes the location of WSN nodes after a coverage hole is generated due to depleted battery-free-thesis.com☆13Jan 24, 2021Updated 5 years ago
- Masters of IT project, network attacks against Profinet SCADA systems.☆32Sep 15, 2016Updated 9 years ago
- Considering the complex terrain forest, the optimal deployment scheme of wireless sensor network is to ensure that the 3D forest is cover…☆14Feb 23, 2019Updated 7 years ago
- ICS Security Labs☆38Mar 27, 2021Updated 4 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- Wireless sensor network simulation☆23Jun 21, 2022Updated 3 years ago
- Treck Network Stack Discovery Tool [Ripple20]☆12Jul 1, 2020Updated 5 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- Cyber-Physical System Models of the Grid☆30Apr 8, 2021Updated 4 years ago
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆61Oct 17, 2023Updated 2 years ago
- Smart charging of electric vehicles for maximizing PV self-consumption using Deep Reinforcement Learning. Data preprocessing was done wit…☆30Nov 21, 2022Updated 3 years ago
- Wireless sensors network deployment using Non-Dominated Sorting Genetic Algorithm.☆29Oct 25, 2019Updated 6 years ago
- Convolutional Neural Network (CNN) was trained on 48x48 pixel grayscale images to predict 5 different emotions from images. Ten different…☆11Sep 21, 2022Updated 3 years ago
- Elegant and efficient error handling and reporting patterns for C☆10Oct 9, 2016Updated 9 years ago
- GAUSS EU project: Unmanned aerial vehicle Traffic Management (UTM) software development☆14Feb 7, 2022Updated 4 years ago
- ☆14Nov 10, 2019Updated 6 years ago
- ISAF aims to be a framework that provides the necessary tools for the correct security audit of industrial environments. This repo is a m…☆59Nov 13, 2023Updated 2 years ago
- The Chrome plugin for SafeKeeper password protection service.☆12Apr 25, 2018Updated 7 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- A Vagrant MultiOS environment to test Puppet code and modules☆73Sep 1, 2017Updated 8 years ago
- Source code for the paper titled: "Unlocking the full potential of smart charging: Addressing paused and delayed charging problems in ele…☆11May 22, 2024Updated last year
- Container building stuff☆16Mar 3, 2026Updated 2 weeks ago
- ☆14Dec 27, 2020Updated 5 years ago
- ☆15Dec 7, 2022Updated 3 years ago
- ☆10Jun 4, 2024Updated last year
- Up to 8 Euclidean Rhythms at once, on your BeatStep Pro☆24Jul 29, 2016Updated 9 years ago
- Swarm Intelligence Algorithm for WSN problems☆31Aug 5, 2017Updated 8 years ago
- Industrial control Security Tool☆77Feb 28, 2021Updated 5 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- WASP Research Arena for Software☆12Jun 10, 2022Updated 3 years ago
- ☆12Jun 14, 2021Updated 4 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆35Feb 9, 2025Updated last year