RoseSecurity / Enumerating-ICS-SCADA-Devices
A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I have compiled scans and scripts for targeting Operational Technology (OT) devices and hosts!
☆43Updated last year
Alternatives and similar repositories for Enumerating-ICS-SCADA-Devices:
Users that are interested in Enumerating-ICS-SCADA-Devices are comparing it to the libraries listed below
- ICS Security Labs☆34Updated 3 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆37Updated last year
- Operational Technology Cyber Attack Database☆47Updated 2 years ago
- ICS security resources☆96Updated 3 weeks ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated last month
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆122Updated last year
- Scripts and other tools to helps parse data or gather information☆65Updated 2 years ago
- ICSSPLOIT (Industrial Control System Exploitation Framework),a exploitation framework based on Python☆51Updated 4 years ago
- EtherNet/IP & CIP Stack Detector☆45Updated 2 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆73Updated this week
- Industrial Hacking Simulator☆25Updated last month
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆28Updated last week
- Graphical Realism Framework for Industrial Control Simulation (GRFICS) version 3☆32Updated 3 years ago
- An assessment tool to interact with Velocio PLCs☆13Updated 3 years ago
- ☆108Updated 4 years ago
- Harness the Power of AI for all your reporting needs.☆28Updated last year
- A packet capture visualizer for industrial control networks.☆52Updated last year
- ☆34Updated last year
- Curated list of awesome, open source data exfiltration tools☆58Updated 3 years ago
- Slides for my conference talks☆43Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated last year
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆27Updated 5 months ago
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆50Updated 3 weeks ago
- A security professional's swiss army knife for interacting with raw serial devices☆27Updated 10 months ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated last year
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆135Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Image Payload Creating/Injecting tools☆12Updated 3 years ago