RoseSecurity / Enumerating-ICS-SCADA-Devices
A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I have compiled scans and scripts for targeting Operational Technology (OT) devices and hosts!
☆43Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Enumerating-ICS-SCADA-Devices
- ICS Security Labs☆34Updated 3 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆47Updated 10 months ago
- Operational Technology Cyber Attack Database☆44Updated 2 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆34Updated last year
- ICS security resources☆91Updated 3 weeks ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆75Updated 2 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆72Updated this week
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆27Updated 2 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆120Updated last year
- Scripts and other tools to helps parse data or gather information☆64Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆50Updated 2 years ago
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- An assessment tool to interact with Velocio PLCs☆13Updated 3 years ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated 10 months ago
- Slides for my conference talks☆43Updated last year
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Image Payload Creating/Injecting tools☆12Updated 3 years ago
- Harness the Power of AI for all your reporting needs.☆28Updated last year
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆27Updated 2 months ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Industrial Hacking Simulator☆25Updated last week
- ☆34Updated last year
- ICSSPLOIT (Industrial Control System Exploitation Framework),a exploitation framework based on Python☆49Updated 4 years ago
- ☆22Updated 4 years ago
- Jupyter Notebooks for the Blue Team☆33Updated last year
- Graphical Realism Framework for Industrial Control Simulation (GRFICS) version 3☆29Updated 3 years ago
- Curated list of awesome, open source data exfiltration tools☆56Updated 3 years ago
- A packet capture visualizer for industrial control networks.☆48Updated 11 months ago