arobinsongit / ICS-PetyaLinks
The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS
☆18Updated 8 years ago
Alternatives and similar repositories for ICS-Petya
Users that are interested in ICS-Petya are comparing it to the libraries listed below
Sorting:
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Industrial Control Systems Network Scanner☆23Updated 9 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 8 years ago
- random scripts for random things☆13Updated 4 months ago
- Miscellaneous scripts for analyzing protocols and systems☆14Updated 9 years ago
- PoC C&C for the Industroyer malware☆25Updated 8 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 8 years ago
- An offensive Powershell console☆30Updated 9 years ago
- IEC104 Client for Metasploit☆11Updated 6 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆39Updated 10 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆87Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- GasPot Released at Blackhat 2015☆140Updated last year
- ☆25Updated 8 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Repository for Endpoint Security Testing☆35Updated 6 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- SMB Auto authentication Vulnerability☆34Updated 8 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago
- ☆16Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Oil Pumpjack: open source materials to create your own oil pumpjack managed by an Arduino☆34Updated 6 years ago