Scenarios of the Robotics CTF (RCTF), a playground to challenge robot security.
☆40Aug 30, 2020Updated 5 years ago
Alternatives and similar repositories for RCTF
Users that are interested in RCTF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Robot Vulnerability Scoring System (RVSS) Python 3 reference implementation.☆31Mar 18, 2020Updated 6 years ago
- Penetration testing tool for ROS☆36Dec 2, 2022Updated 3 years ago
- Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.☆225Jun 24, 2024Updated last year
- ☆25Aug 24, 2020Updated 5 years ago
- aztarna, a footprinting tool for robots.☆93Aug 24, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotic…☆98Dec 28, 2018Updated 7 years ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Jul 12, 2018Updated 7 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- ROS package dependency scanner☆10Mar 11, 2020Updated 6 years ago
- Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.☆393Oct 7, 2024Updated last year
- python framework to parse logs for IR☆15May 2, 2021Updated 4 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- Threat Model analysis for MARA modular robot☆26Sep 3, 2019Updated 6 years ago
- GitHub Repository for the HW CWE SIG☆17Mar 25, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Object detecting and estimation pose using darknet_ros with jsk_pcl☆16Apr 21, 2020Updated 5 years ago
- ROS node that turns your robot into a web server to visualize ROS topics☆14Mar 20, 2025Updated last year
- ROS2 node that collects metrics about system resource consumption and publishes them to a topic to be emitted to CloudWatch Metrics.☆16Feb 8, 2022Updated 4 years ago
- NCurses based invaders game☆12May 11, 2024Updated last year
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆18Mar 21, 2025Updated last year
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)☆23Mar 6, 2023Updated 3 years ago
- Turn your Adafruit Circuit Playground into a multi-faceted MIDI controller. Designed for my workshops experimenting with the WebMIDI API☆21Nov 18, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆32Feb 12, 2026Updated last month
- My PoCs☆10Apr 5, 2020Updated 6 years ago
- Specter is a Python BDD testing library which takes inspiration from RSpec and Jasmine☆25Mar 30, 2026Updated last week
- ExplorerPy is a scanning-toolkit . It can perform subdomain enumeration, directory brute-forcing, and port scanning.☆10Jan 30, 2024Updated 2 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- High-level library for executable binary file analysis☆16Feb 13, 2017Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- An example of how to use `camera_ros` with Raspberry Pi Cameras modules inside an arm64v8/ros:jazzy docker container, running on top of R…☆13Feb 20, 2025Updated last year
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated 2 months ago
- Operational Technology (OT) Simulator☆55Oct 6, 2025Updated 6 months ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Simple volatility profile builder based on Docker container☆21Aug 24, 2020Updated 5 years ago