Orange-Cyberdefense / awesome-industrial-protocolsView external linksLinks
Security-oriented list of resources about industrial network protocols.
☆665Jan 30, 2026Updated 2 weeks ago
Alternatives and similar repositories for awesome-industrial-protocols
Users that are interested in awesome-industrial-protocols are comparing it to the libraries listed below
Sorting:
- Collection of writeups on ICS/SCADA security.☆195Oct 19, 2025Updated 3 months ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 10 months ago
- A source code static analysis platform for AppSec enthusiasts.☆267Dec 8, 2025Updated 2 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,926Oct 10, 2025Updated 4 months ago
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆170Oct 31, 2022Updated 3 years ago
- Tools, tips, tricks, and more for exploring ICS Security.☆1,909Apr 15, 2025Updated 10 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Sep 29, 2025Updated 4 months ago
- A curated list of hardware-oriented CTF challenges.☆54Jan 23, 2026Updated 3 weeks ago
- game of active directory☆7,437Jul 16, 2025Updated 7 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆886Updated this week
- Arsenal is just a quick inventory and launcher for hacking programs☆3,680Nov 29, 2024Updated last year
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆302Mar 1, 2023Updated 2 years ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆565Jun 5, 2023Updated 2 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,123Oct 21, 2024Updated last year
- RunPE implementation with multiple evasive techniques (1)☆380Sep 22, 2023Updated 2 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆410May 29, 2024Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- A python tool to automate KeePass discovery and secret extraction.☆515Dec 12, 2024Updated last year
- ☆567Mar 28, 2024Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,471Jan 23, 2026Updated 3 weeks ago
- ☆1,071May 18, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,258Dec 9, 2025Updated 2 months ago
- The Network Execution Tool☆5,250Feb 8, 2026Updated last week
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆1,010Jan 7, 2026Updated last month
- ☆412Dec 14, 2023Updated 2 years ago
- DPAPI looting remotely and locally in Python☆540Oct 7, 2025Updated 4 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,143Mar 28, 2025Updated 10 months ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆41Oct 27, 2023Updated 2 years ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,368Oct 22, 2025Updated 3 months ago
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆52Feb 14, 2025Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆358Dec 13, 2025Updated 2 months ago
- AAD related enumeration in Nim☆132Sep 7, 2023Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆155Oct 19, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆302Jan 20, 2026Updated 3 weeks ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆747May 23, 2025Updated 8 months ago