Z-0ne / SCADA-Rules
Snort rules
☆35Updated 6 years ago
Alternatives and similar repositories for SCADA-Rules:
Users that are interested in SCADA-Rules are comparing it to the libraries listed below
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- ICS/SCADA/PLC Discovery Tools Releases☆40Updated 9 years ago
- Automatically exported from code.google.com/p/plcscan☆57Updated 9 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 7 years ago
- Attack data☆25Updated 6 years ago
- ☆9Updated 8 years ago
- Simple, useful scripts for red/blue team situations☆22Updated 9 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- DockerFiles for Docker Containers☆16Updated 7 years ago
- ☆46Updated 8 years ago
- A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)☆15Updated 6 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆36Updated 7 years ago
- ☆37Updated 9 years ago
- ☆14Updated 6 years ago
- passive dns collector☆10Updated 7 years ago
- Web scan foundation framework☆23Updated 7 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 7 years ago
- Industrial control Security Tool☆77Updated 3 years ago
- using python to hack☆31Updated 8 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆51Updated 7 years ago
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Updated 7 years ago
- A set of ICS IDS rules for use with Suricata.☆49Updated last year
- Industrial Security Checklist☆10Updated 8 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 7 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 6 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- ☆28Updated 7 years ago
- DoS PoC's for SAP products☆50Updated 7 years ago