RoseSecurity / Enumerating-ICS-SCADA-DevicesLinks
A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I have compiled scans and scripts for targeting Operational Technology (OT) devices and hosts!
☆43Updated 2 years ago
Alternatives and similar repositories for Enumerating-ICS-SCADA-Devices
Users that are interested in Enumerating-ICS-SCADA-Devices are comparing it to the libraries listed below
Sorting:
- Documentation and guidance to practice secure coding for various PLC vendors☆37Updated last year
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆49Updated last month
- ICS Security Labs☆37Updated 4 years ago
- Scripts and other tools to helps parse data or gather information☆66Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆31Updated 4 months ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆83Updated this week
- EtherNet/IP & CIP Stack Detector☆45Updated 2 years ago
- ICS security resources☆108Updated 2 months ago
- An assessment tool to interact with Velocio PLCs☆13Updated 3 years ago
- ICSSPLOIT (Industrial Control System Exploitation Framework),a exploitation framework based on Python☆54Updated 5 years ago
- Operational Technology (OT) Simulator☆40Updated 4 months ago
- Curated list of awesome, open source data exfiltration tools☆58Updated 3 years ago
- A security professional's swiss army knife for interacting with raw serial devices☆28Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆128Updated last year
- A packet capture visualizer for industrial control networks.☆55Updated last year
- Slides for my conference talks☆44Updated last year
- Operational Technology Cyber Attack Database☆49Updated 2 years ago
- ☆34Updated 2 years ago
- A tool to interact with the Modbus protocols☆78Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- ☆111Updated 5 years ago
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆57Updated 4 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆30Updated 10 months ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆16Updated 4 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Advanced OPC-UA framework for vulnerability research & exploitation☆56Updated last year
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- Industrial Hacking Simulator☆27Updated last month
- Create visualization from Shodan query☆74Updated 4 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago