Source code for Modbus/TCP fuzzer used for ETFA 2015 paper
☆21Feb 6, 2025Updated last year
Alternatives and similar repositories for etfa2015
Users that are interested in etfa2015 are comparing it to the libraries listed below
Sorting:
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- IRB Drawing Interface☆14Dec 11, 2019Updated 6 years ago
- random scripts for random things☆13Mar 11, 2025Updated 11 months ago
- Common Industrial Protocol based device scanner over the internet☆24Mar 10, 2016Updated 9 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- ☆13Apr 11, 2018Updated 7 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- Modbus tap/tun tunneler, for making arbitrary ethernet connections over Modbus/TCP.☆12Dec 17, 2012Updated 13 years ago
- ☆13Jul 24, 2022Updated 3 years ago
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 8 years ago
- Monitor JSON notifications feed from VT☆17Jun 13, 2017Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776)☆16Aug 29, 2018Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- ☆38Jun 23, 2023Updated 2 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- Modbus stager in assembly and some scripts to upload/download data to the holding register of a PLC☆44Jun 10, 2020Updated 5 years ago
- SCADA network attack datasets and process logs☆20May 2, 2017Updated 8 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Malware Sandbox Emulation in Python @ HITCON 2018☆46Aug 1, 2018Updated 7 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Dec 7, 2023Updated 2 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- Gathers public information on companies to highlight social engineering risk.☆30May 25, 2016Updated 9 years ago
- Masters of IT project, network attacks against Profinet SCADA systems.☆32Sep 15, 2016Updated 9 years ago