Security-oriented list of resources about industrial network protocols.
☆698Mar 12, 2026Updated last month
Alternatives and similar repositories for awesome-industrial-protocols
Users that are interested in awesome-industrial-protocols are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of hardware-oriented CTF challenges.☆59Jan 23, 2026Updated 3 months ago
- A tool for recovering credentials from sniffed PPPoE, RADIUS and L2TPv2 CHAP authentications☆18Apr 25, 2016Updated 10 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,954Oct 10, 2025Updated 6 months ago
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆171Oct 31, 2022Updated 3 years ago
- Tools, tips, tricks, and more for exploring ICS Security.☆1,961Apr 15, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Collection of writeups on ICS/SCADA security.☆198Oct 19, 2025Updated 6 months ago
- My personal OT resource list, gather throughout research and internet adventure.☆149Apr 2, 2026Updated last month
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- Ask a TGS on behalf of another user without password☆483Mar 30, 2025Updated last year
- WAV to MMV converter. You can then use the MMV file in input of MSSTV to decode Slow Scan Television (SSTV) sound signals.☆21Jan 31, 2025Updated last year
- game of active directory☆7,771Mar 12, 2026Updated last month
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆53Feb 14, 2025Updated last year
- Extract NFS files from wireshark capture (pcap)☆28Aug 5, 2024Updated last year
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆375Mar 24, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A wireshark dissector addon for the Modbus umas Shneider protocol☆20Dec 19, 2022Updated 3 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,721Nov 29, 2024Updated last year
- A python tool to automate KeePass discovery and secret extraction.☆523Dec 12, 2024Updated last year
- A collection of ICS/SCADA PCAPs☆554Jan 3, 2020Updated 6 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- EtherNet/IP & CIP Stack Detector☆50Aug 4, 2022Updated 3 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,146Oct 21, 2024Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,521Mar 18, 2026Updated last month
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆570Jun 5, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆915Apr 24, 2026Updated 2 weeks ago
- ☆570Mar 28, 2024Updated 2 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,281Apr 23, 2026Updated 2 weeks ago
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆301Mar 1, 2023Updated 3 years ago
- The Network Execution Tool☆5,487Apr 29, 2026Updated last week
- RunPE implementation with multiple evasive techniques (1)☆386Sep 22, 2023Updated 2 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆423May 29, 2024Updated last year
- Malmod☆15Jan 19, 2020Updated 6 years ago
- linikatz is a tool to attack AD on UNIX☆156Oct 19, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Microsoft’s cyber physical system researchers recently identified multiple high-severity vulnerabilities in the CODESYS V3 software devel…☆53Aug 14, 2023Updated 2 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆259Nov 24, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- Orange Cyberdefense mindmaps☆1,563Mar 10, 2025Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆1,024Jan 7, 2026Updated 4 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,255Mar 28, 2025Updated last year