Z-0ne / SCADA-Rules
Snort rules
☆35Updated 6 years ago
Alternatives and similar repositories for SCADA-Rules:
Users that are interested in SCADA-Rules are comparing it to the libraries listed below
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- ICS/SCADA/PLC Discovery Tools Releases☆40Updated 10 years ago
- Industrial control Security Tool☆77Updated 4 years ago
- passive dns collector☆10Updated 8 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Ruby interface to cirt.net default passwords database☆20Updated 14 years ago
- Automatically exported from code.google.com/p/plcscan☆58Updated 10 years ago
- DockerFiles for Docker Containers☆16Updated 7 years ago
- ☆14Updated 6 years ago
- ☆42Updated 2 years ago
- ☆46Updated 8 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- Simple, useful scripts for red/blue team situations☆22Updated 10 years ago
- Attack data☆25Updated 7 years ago
- ☆9Updated 8 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- ☆12Updated 5 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- using python to hack☆31Updated 9 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Updated 7 years ago
- ☆28Updated 7 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆36Updated 7 years ago
- A dsniff project using bro☆10Updated 9 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- Industrial Security Checklist☆10Updated 8 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 8 years ago
- ☆36Updated 9 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)☆15Updated 6 years ago