MDudek-ICS / TRISIS-TRITON-HATMANLinks
Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware
☆240Updated 4 years ago
Alternatives and similar repositories for TRISIS-TRITON-HATMAN
Users that are interested in TRISIS-TRITON-HATMAN are comparing it to the libraries listed below
Sorting:
- Triconex TriStation utilities and tools☆76Updated 6 years ago
- Moki Distribution - ICS/SCADA Tools☆110Updated 8 years ago
- Sample files for Control Things Platform☆40Updated 3 months ago
- snake - a malware storage zoo☆216Updated 2 years ago
- Graphical Realism Framework for Industrial Control Simulations☆222Updated last year
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆107Updated 7 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆63Updated 8 years ago
- GasPot Released at Blackhat 2015☆141Updated last year
- Automatic Yara Rule Generation☆334Updated 9 years ago
- Set of tools for interacting with Malshare☆156Updated 5 years ago
- VirtuaPlant is a Industrial Control Systems simulator which adds a “similar to real-world control logic” to the basic “read/write tags” f…☆220Updated 3 years ago
- ICS TestBed Framework☆68Updated 6 years ago
- Open source tools for realistic-behaving electric grid honeynets☆56Updated 10 years ago
- A Yara rule generator for finding related samples and hunting☆160Updated 2 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆139Updated 2 years ago
- ☆97Updated 10 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- Parse YARA rules and operate over them more easily.☆191Updated 6 months ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- A set of ICS IDS rules for use with Suricata.☆50Updated last year
- Wraps around various tools and provides some additional checks/information to produce a centralized report of a PE file.☆206Updated 11 years ago
- A simple Modbus/TCP client write in pure Perl.☆125Updated last year
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆268Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆105Updated 4 years ago
- Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant☆237Updated 2 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Updated 3 years ago
- Set of Yara rules for finding files using magics headers☆138Updated 4 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆475Updated 3 years ago