aliasrobotics / RCTF
Scenarios of the Robotics CTF (RCTF), a playground to challenge robot security.
☆32Updated 4 years ago
Alternatives and similar repositories for RCTF:
Users that are interested in RCTF are comparing it to the libraries listed below
- Robot Vulnerability Scoring System (RVSS) Python 3 reference implementation.☆25Updated 4 years ago
- Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.☆183Updated 7 months ago
- Penetration testing tool for ROS☆32Updated 2 years ago
- aztarna, a footprinting tool for robots.☆90Updated 4 years ago
- ☆25Updated 4 years ago
- The Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotic…☆88Updated 6 years ago
- Threat Model analysis for MARA modular robot☆26Updated 5 years ago
- Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.☆333Updated 4 months ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Updated 6 years ago
- An automatic fuzzing tool for ROS 2 C++ projects☆13Updated 3 years ago
- Metasploit Modules for OPC UA☆31Updated 4 years ago
- H(igh) A(ssurance) ROS - Static analysis of ROS1 application code.☆192Updated 2 months ago
- rosploit tools☆14Updated 3 years ago
- A dataset of 200+ bugs in the Robot Operating System for BugZoo☆31Updated 11 months ago
- The Robotics Language is an open compiler where users can develop languages to generate ROS code☆60Updated 5 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆104Updated 6 years ago
- Material from ICS Village talk at DEFCON 25☆11Updated 6 years ago
- tools to generate and distribute keys for SROS 2☆92Updated 3 weeks ago
- This repository provides fuzzing scripts to analyze an IEC 61850 implementation☆7Updated 4 years ago
- Tools demonstrated at DEF CON 26 talk "Hacking PLCs and Causing Havoc on Critical Infrastructures"☆45Updated 6 years ago
- Files used for reproducing Fuzzware's experiments☆55Updated last year
- ☆16Updated last year
- Read only mirror - No pull requests☆20Updated 3 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- Robotic platform for industrial control systems cybersecurity research. We use the research-grade Youbot as the robotics platform for ou…☆27Updated 9 years ago
- ☆12Updated 8 years ago
- Embedded AppSec Best Practices☆40Updated last year
- Repository to build and test Turtlebot3 packages☆21Updated 3 years ago
- Exercises for (legacy) Computer Security course in the University of Oulu☆44Updated last year
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆61Updated 7 years ago