MODBUS Penetration Testing Framework
☆12Jul 2, 2017Updated 8 years ago
Alternatives and similar repositories for smod
Users that are interested in smod are comparing it to the libraries listed below
Sorting:
- Material from my ICS Village talk at DEFCON 25☆24Jul 28, 2017Updated 8 years ago
- MODBUS Penetration Testing Framework☆93Jan 14, 2016Updated 10 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- free exploit framework written use python language version 3.3☆30Mar 31, 2018Updated 7 years ago
- RSMP Signal Exchange List (SXL) for Traffic Controllers☆12Dec 19, 2025Updated 2 months ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆46Feb 27, 2024Updated 2 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- ☆12Sep 25, 2020Updated 5 years ago
- ☆12Dec 15, 2024Updated last year
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Implementation of CoAP Server & Client in Go by @Kistler-Group☆13Jun 22, 2021Updated 4 years ago
- A batch program to crack relatively easy password protected archives (zip/rar).☆12Dec 24, 2023Updated 2 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Let's Snatch The Admin Panel Of Any Website In Seconds.☆17Feb 24, 2020Updated 6 years ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- An internal multihack for Counter-Strike: Source. Features include aimbot, triggerbot, auto bunnyhop, and anti-flash.☆12Oct 26, 2025Updated 4 months ago
- engine for web-based bullet dodging game☆11May 13, 2017Updated 8 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- A simple CORS testing script.☆17Aug 1, 2013Updated 12 years ago
- Hello World examples in assembly, for use as templates.☆12Jan 18, 2026Updated last month
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- ☆12Nov 12, 2022Updated 3 years ago
- Test environments for crosschain operations☆14Dec 16, 2021Updated 4 years ago
- Reports in .MD format☆21Jul 8, 2025Updated 7 months ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- OpenRISC 1000 processor module for IDA 7.x☆13Feb 13, 2024Updated 2 years ago
- gtfobin checker☆11Oct 25, 2020Updated 5 years ago
- ☆11Jan 26, 2026Updated last month
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- ☆11Dec 7, 2021Updated 4 years ago