PoC C&C for the Industroyer malware
☆26Jun 30, 2017Updated 8 years ago
Alternatives and similar repositories for Indushell
Users that are interested in Indushell are comparing it to the libraries listed below
Sorting:
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 8 years ago
- Modbus stager in assembly and some scripts to upload/download data to the holding register of a PLC☆44Jun 10, 2020Updated 5 years ago
- Tools to interact with Siemens PLCs☆13Aug 23, 2023Updated 2 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Dec 7, 2023Updated 2 years ago
- Modbus tap/tun tunneler, for making arbitrary ethernet connections over Modbus/TCP.☆12Dec 17, 2012Updated 13 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- Source code for Modbus/TCP fuzzer used for ETFA 2015 paper☆21Feb 6, 2025Updated last year
- IRB Drawing Interface☆12Dec 11, 2019Updated 6 years ago
- distributed nmap using Celery☆11Mar 17, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Wireshark dissector for wirelessHART☆13Aug 2, 2017Updated 8 years ago
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- random scripts for random things☆13Mar 11, 2025Updated 11 months ago
- goscanner is a tool for large-scale TLS and SSH scans☆33Jan 7, 2026Updated last month
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- Modbus TCP vulnerability demonstration☆15Jan 22, 2020Updated 6 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- Snort rules☆35Nov 20, 2018Updated 7 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- UMASploit - ClearEnergy modules☆16Apr 14, 2017Updated 8 years ago
- Zeek Ethercat Parser - CISA ICSNPP☆18Nov 6, 2025Updated 3 months ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- Masters of IT project, network attacks against Profinet SCADA systems.☆31Sep 15, 2016Updated 9 years ago
- Metasploit Modules for OPC UA☆35Apr 2, 2020Updated 5 years ago
- Python / Scapy tool to analyze and interact with IEC 61850 Goose traffic☆37Dec 15, 2021Updated 4 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- Process-Aware Stealthy Attack Detection☆15Oct 17, 2018Updated 7 years ago
- Public Code for ICS Evasion Attack Generation☆44Apr 23, 2021Updated 4 years ago
- Small script to retrieve passwords from many types of Moxa device, including NPort, OnCell, MGate, etc.☆37Jan 17, 2017Updated 9 years ago
- Triconex TriStation utilities and tools☆80Jan 21, 2019Updated 7 years ago
- A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)☆16Aug 29, 2018Updated 7 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- intel amt honeypot☆18May 9, 2017Updated 8 years ago