RoseSecurity / SIMATIC-SMACKDOWNLinks
A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to target multiple operating systems out of the box, SIMATIC-SMACKDOWN enumerates networks for S7 devices before launching a distributed attack to STOP PLC CPUs.
☆58Updated last year
Alternatives and similar repositories for SIMATIC-SMACKDOWN
Users that are interested in SIMATIC-SMACKDOWN are comparing it to the libraries listed below
Sorting:
- ☆85Updated 3 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆168Updated 3 years ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆45Updated 2 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆46Updated 2 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆112Updated 9 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆107Updated 2 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆34Updated 3 years ago
- All kinds of tiny shells☆65Updated 2 years ago
- ☆105Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Updated last year
- A Repository to Track Anti-Forensic Techniques☆117Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆59Updated 4 months ago
- ☆138Updated 2 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 11 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- Hunting for passwords with deep learning☆235Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆101Updated 5 months ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆272Updated last year
- exfiltration/infiltration toolkit☆49Updated last year
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- ☆67Updated 3 years ago