SecarmaLabs / IndushellLinks
PoC C&C for the Industroyer malware
☆25Updated 7 years ago
Alternatives and similar repositories for Indushell
Users that are interested in Indushell are comparing it to the libraries listed below
Sorting:
- Miscellaneous scripts for analyzing protocols and systems☆14Updated 8 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- Modbus stager in assembly and some scripts to upload/download data to the holding register of a PLC☆43Updated 4 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- Modbus VCR☆27Updated 7 years ago
- PHDAYS |||☆17Updated 12 years ago
- Industrial Control Systems Network Scanner☆23Updated 9 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- ICS/SCADA/PLC Discovery Tools Releases☆40Updated 10 years ago
- Industrial control Security Tool☆77Updated 4 years ago
- NMAP NSE script for detecting devices that speak the Crimson v3 protocol☆12Updated 10 years ago
- Simple DDE object detector☆56Updated 7 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Creating a vulnerable environment and the PoC☆15Updated 5 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- ☆20Updated 9 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 11 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- ☆47Updated 9 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago