atimorin / PoC2013View external linksLinks
Power of Community 2013 conference special release of ICS/SCADA toolkit
☆88Nov 4, 2013Updated 12 years ago
Alternatives and similar repositories for PoC2013
Users that are interested in PoC2013 are comparing it to the libraries listed below
Sorting:
- ☆215Jan 14, 2016Updated 10 years ago
- Wireshark Lua Dissector for inspecting the Crimson v3 protocol☆16Sep 3, 2014Updated 11 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Nov 17, 2015Updated 10 years ago
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Jun 24, 2016Updated 9 years ago
- NMAP NSE script for detecting devices that speak the Crimson v3 protocol☆12Aug 27, 2014Updated 11 years ago
- Digital Bond's ICS Enumeration Tools☆459Mar 10, 2020Updated 5 years ago
- UMASploit - ClearEnergy modules☆16Apr 14, 2017Updated 8 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Jun 15, 2016Updated 9 years ago
- ics security tools☆20May 13, 2017Updated 8 years ago
- Industrial control Security Tool☆77Feb 28, 2021Updated 4 years ago
- Source-binary patch presence test system.☆27Mar 21, 2020Updated 5 years ago
- 分布式互联网开放端口与协议扫描☆18Jul 20, 2016Updated 9 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago
- Modbus Protocol Fuzzer☆49Oct 4, 2025Updated 4 months ago
- modbus fuzzer based on boofuzz framework.!! Cool☆31Aug 10, 2025Updated 6 months ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆26Apr 14, 2015Updated 10 years ago
- ☆31Feb 15, 2017Updated 8 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- ☆22May 11, 2022Updated 3 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Jan 10, 2017Updated 9 years ago
- Environment for CVE-2018-1273 (Spring Data Commons)☆10Aug 15, 2018Updated 7 years ago
- 一个简单的php危险函数检测工具☆10Dec 19, 2018Updated 7 years ago
- A set of ICS IDS rules for use with Suricata.☆51Oct 13, 2023Updated 2 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- random scripts for random things☆13Mar 11, 2025Updated 11 months ago
- 开源!自主设计的badusb电路板☆10Mar 26, 2021Updated 4 years ago
- ☆11Aug 2, 2016Updated 9 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Tools to interact with Siemens PLCs☆13Aug 23, 2023Updated 2 years ago
- ☆14Feb 7, 2018Updated 8 years ago
- CTF比赛,VxWorks弱hash算法,密码碰撞解析☆14Aug 9, 2018Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 7 years ago
- Modbus TCP vulnerability demonstration☆15Jan 22, 2020Updated 6 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago