RoseSecurity / SIMATIC-SMACKDOWN
A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to target multiple operating systems out of the box, SIMATIC-SMACKDOWN enumerates networks for S7 devices before launching a distributed attack to STOP PLC CPUs.
☆52Updated 3 months ago
Alternatives and similar repositories for SIMATIC-SMACKDOWN:
Users that are interested in SIMATIC-SMACKDOWN are comparing it to the libraries listed below
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆48Updated 3 months ago
- The most average C2 ever (MACE)☆96Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆116Updated 6 months ago
- ☆84Updated 2 years ago
- ☆32Updated 2 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- ICS Security Labs☆35Updated 4 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated 8 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- ☆104Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- ☆66Updated 2 years ago
- Linux Enumeration / Privilege escalation tool☆23Updated 4 years ago
- ☆80Updated 5 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 10 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A simple tool designed to create Atomic Red Team tests with ease.☆39Updated last month
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- Graphical map of known Advanced Persistent Threats☆53Updated last month
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆15Updated 2 years ago
- EtherNet/IP & CIP Stack Detector☆45Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- ☆66Updated 2 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆113Updated 2 years ago