Security-oriented list of resources about industrial network protocols.
☆686Mar 12, 2026Updated last month
Alternatives and similar repositories for awesome-industrial-protocols
Users that are interested in awesome-industrial-protocols are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of hardware-oriented CTF challenges.☆58Jan 23, 2026Updated 2 months ago
- A tool for recovering credentials from sniffed PPPoE, RADIUS and L2TPv2 CHAP authentications☆18Apr 25, 2016Updated 9 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,945Oct 10, 2025Updated 6 months ago
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆169Oct 31, 2022Updated 3 years ago
- Tools, tips, tricks, and more for exploring ICS Security.☆1,946Apr 15, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Collection of writeups on ICS/SCADA security.☆197Oct 19, 2025Updated 6 months ago
- My personal OT resource list, gather throughout research and internet adventure.☆146Apr 2, 2026Updated 2 weeks ago
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated last year
- A source code static analysis platform for AppSec enthusiasts.☆271Apr 3, 2026Updated 2 weeks ago
- WAV to MMV converter. You can then use the MMV file in input of MSSTV to decode Slow Scan Television (SSTV) sound signals.☆21Jan 31, 2025Updated last year
- game of active directory☆7,691Mar 12, 2026Updated last month
- Extract NFS files from wireshark capture (pcap)☆27Aug 5, 2024Updated last year
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆53Feb 14, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆374Mar 24, 2026Updated 3 weeks ago
- A wireshark dissector addon for the Modbus umas Shneider protocol☆20Dec 19, 2022Updated 3 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,713Nov 29, 2024Updated last year
- A python tool to automate KeePass discovery and secret extraction.☆520Dec 12, 2024Updated last year
- A collection of ICS/SCADA PCAPs☆552Jan 3, 2020Updated 6 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- EtherNet/IP & CIP Stack Detector☆50Aug 4, 2022Updated 3 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,139Oct 21, 2024Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,515Mar 18, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Malmod☆14Jan 19, 2020Updated 6 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆569Jun 5, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆907Apr 9, 2026Updated last week
- ☆570Mar 28, 2024Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,276Dec 9, 2025Updated 4 months ago
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆301Mar 1, 2023Updated 3 years ago
- The Network Execution Tool☆5,407Apr 6, 2026Updated last week
- RunPE implementation with multiple evasive techniques (1)☆384Sep 22, 2023Updated 2 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆419May 29, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- linikatz is a tool to attack AD on UNIX☆156Oct 19, 2023Updated 2 years ago
- Microsoft’s cyber physical system researchers recently identified multiple high-severity vulnerabilities in the CODESYS V3 software devel…☆53Aug 14, 2023Updated 2 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Oct 16, 2023Updated 2 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- Orange Cyberdefense mindmaps☆1,555Mar 10, 2025Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆1,019Jan 7, 2026Updated 3 months ago