atimorin / PoC2013Links
Power of Community 2013 conference special release of ICS/SCADA toolkit
☆88Updated 12 years ago
Alternatives and similar repositories for PoC2013
Users that are interested in PoC2013 are comparing it to the libraries listed below
Sorting:
- nse scripts for scada identification☆131Updated 12 years ago
- Industrial control Security Tool☆77Updated 4 years ago
- ☆213Updated 10 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 10 years ago
- Snort rules☆35Updated 7 years ago
- Automatically exported from code.google.com/p/plcscan☆60Updated 10 years ago
- Nmap scans of Internet of Things devices☆121Updated 10 years ago
- ICS/SCADA/PLC Discovery Tools Releases☆40Updated 10 years ago
- Modbus VCR☆27Updated 8 years ago
- A set of ICS IDS rules for use with Suricata.☆51Updated 2 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆64Updated 8 years ago
- ☆99Updated 10 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Updated 2 years ago
- Digital Bond's ICS Enumeration Tools☆459Updated 5 years ago
- Modbus Protocol Fuzzer☆49Updated 3 months ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆211Updated 8 years ago
- ☆42Updated 3 years ago
- Graphical Realism Framework for Industrial Control Simulations☆223Updated last year
- ☆51Updated 6 years ago
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆256Updated 5 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆110Updated 7 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- Moki Distribution - ICS/SCADA Tools☆113Updated 8 years ago
- Modbus stager in assembly and some scripts to upload/download data to the holding register of a PLC☆44Updated 5 years ago
- Material from my ICS Village talk at DEFCON 25☆24Updated 8 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆213Updated 5 years ago
- Triconex TriStation utilities and tools☆80Updated 7 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆153Updated 8 years ago
- protocol fuzzing toolkit☆128Updated 6 years ago
- UMASploit - ClearEnergy modules☆16Updated 8 years ago