Z-0ne / SCADA-Rules
Snort rules
☆35Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for SCADA-Rules
- ICS/SCADA/PLC Discovery Tools Releases☆38Updated 9 years ago
- passive dns collector☆10Updated 7 years ago
- Automatically exported from code.google.com/p/plcscan☆56Updated 9 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- Attack data☆25Updated 6 years ago
- ☆9Updated 7 years ago
- ☆45Updated 8 years ago
- Industrial control Security Tool☆76Updated 3 years ago
- ☆14Updated 6 years ago
- DoS PoC's for SAP products☆48Updated 6 years ago
- Simple, useful scripts for red/blue team situations☆22Updated 9 years ago
- DockerFiles for Docker Containers☆16Updated 7 years ago
- Ruby interface to cirt.net default passwords database☆20Updated 13 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 8 years ago
- A set of ICS IDS rules for use with Suricata.☆47Updated last year
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 7 years ago
- ☆37Updated 9 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆36Updated 7 years ago
- Web scan foundation framework☆23Updated 7 years ago
- Industrial Security Checklist☆10Updated 8 years ago
- Eagle is a Web Application Attack and Audit Framework. Eagle has moved to Bitbucket.☆11Updated 8 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 7 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 7 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- Siemens Simatic S7 Metasploit Modules☆33Updated 12 years ago
- Forced set CIO data and Control Omron PLC CPU☆27Updated 9 years ago