atimorin / PoC2013Links
Power of Community 2013 conference special release of ICS/SCADA toolkit
☆88Updated 12 years ago
Alternatives and similar repositories for PoC2013
Users that are interested in PoC2013 are comparing it to the libraries listed below
Sorting:
- nse scripts for scada identification☆131Updated 12 years ago
- Industrial control Security Tool☆78Updated 4 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 10 years ago
- Snort rules☆35Updated 7 years ago
- ☆212Updated 9 years ago
- Nmap scans of Internet of Things devices☆122Updated 10 years ago
- ICS/SCADA/PLC Discovery Tools Releases☆40Updated 10 years ago
- A set of ICS IDS rules for use with Suricata.☆51Updated 2 years ago
- Modbus VCR☆27Updated 8 years ago
- Automatically exported from code.google.com/p/plcscan☆59Updated 10 years ago
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆251Updated 5 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆63Updated 8 years ago
- Modbus Protocol Fuzzer☆48Updated 3 months ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆209Updated 8 years ago
- ☆98Updated 10 years ago
- Graphical Realism Framework for Industrial Control Simulations☆223Updated last year
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- Moki Distribution - ICS/SCADA Tools☆113Updated 8 years ago
- Digital Bond's ICS Enumeration Tools☆456Updated 5 years ago
- ☆51Updated 6 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆213Updated 5 years ago
- Some tools to monitor BillGates CnC servers☆135Updated 11 years ago
- CANBus protection used to isolate third party systems requiring OBDII access.☆19Updated 10 years ago
- Triconex TriStation utilities and tools☆80Updated 6 years ago
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆150Updated 5 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Updated 2 years ago
- PoC C&C for the Industroyer malware☆26Updated 8 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Updated 9 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆153Updated 8 years ago
- ☆42Updated 3 years ago