RoseSecurity / Enumerating-ICS-SCADA-Devices
A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I have compiled scans and scripts for targeting Operational Technology (OT) devices and hosts!
☆43Updated last year
Alternatives and similar repositories for Enumerating-ICS-SCADA-Devices:
Users that are interested in Enumerating-ICS-SCADA-Devices are comparing it to the libraries listed below
- ICS Security Labs☆34Updated 3 years ago
- Operational Technology Cyber Attack Database☆46Updated 2 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆34Updated last year
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆47Updated last week
- ICS security resources☆93Updated last week
- A packet capture visualizer for industrial control networks.☆51Updated last year
- Scripts and other tools to helps parse data or gather information☆65Updated 2 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆121Updated last year
- An assessment tool to interact with Velocio PLCs☆13Updated 3 years ago
- ICSSPLOIT (Industrial Control System Exploitation Framework),a exploitation framework based on Python☆50Updated 4 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆28Updated 2 years ago
- A security professional's swiss army knife for interacting with raw serial devices☆26Updated 8 months ago
- Industrial Hacking Simulator☆25Updated last week
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆52Updated 3 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Slides for my conference talks☆43Updated last year
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆27Updated 4 months ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- EtherNet/IP & CIP Stack Detector☆44Updated 2 years ago
- A tool to interact with the Modbus protocols☆71Updated 8 months ago
- Curated list of awesome, open source data exfiltration tools☆57Updated 3 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆72Updated this week
- CybatiWorks-1 ICS/SCADA/IoT/IT Cybersecurity Education Platform☆9Updated 9 years ago
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆132Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Graphical Realism Framework for Industrial Control Simulation (GRFICS) version 3☆30Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆74Updated 2 years ago
- My personal OT resource list, gather throughout research and internet adventure.☆52Updated 2 months ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year