Avatar² examples showcased in "Avatar²: A Multi-target Orchestration Platform"
☆18Feb 7, 2018Updated 8 years ago
Alternatives and similar repositories for bar18_avatar2
Users that are interested in bar18_avatar2 are comparing it to the libraries listed below
Sorting:
- ☆27Jul 31, 2021Updated 4 years ago
- Simple daemon to create a wifi hotspot on Linux☆14May 17, 2020Updated 5 years ago
- Python and AFSDK project☆15May 11, 2017Updated 8 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 8 years ago
- ☆67Sep 3, 2020Updated 5 years ago
- Python core of avatar²☆566Mar 31, 2025Updated 11 months ago
- A packet capture visualizer for industrial control networks.☆55Dec 4, 2023Updated 2 years ago
- Examples demonstrating the usage of avatar²☆28Dec 9, 2023Updated 2 years ago
- ☆53Jun 23, 2025Updated 8 months ago
- Timing Sidechannel workshop☆30Nov 25, 2013Updated 12 years ago
- Zeek Ethernet/IP and CIP Parser - CISA ICSNPP☆26Nov 6, 2025Updated 4 months ago
- aurora-d☆20Apr 24, 2022Updated 3 years ago
- Damn Vulnerable Chemical Process - Vinyl Acetate Monomer☆22Dec 13, 2015Updated 10 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Dec 7, 2023Updated 2 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Nov 17, 2015Updated 10 years ago
- This repository contains the documentation for Open Message Format (OMF)☆11Jun 29, 2023Updated 2 years ago
- FoRTE-Research's fuzzing benchmarks☆57Mar 12, 2019Updated 6 years ago
- Traffic captures between STEP7/WinCC and S7-300/S7-400 PLCs☆73Jun 10, 2016Updated 9 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Jun 11, 2019Updated 6 years ago
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆141Oct 14, 2023Updated 2 years ago
- Locates Honeywell/Tridium/Niagara HVAC JACEs/Controllers via HTTP fingerprints/strings. Very handy for vulnerability/pentesting.☆43Jan 9, 2017Updated 9 years ago
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Mar 22, 2024Updated last year
- A LoRaWAN Security Evaluation Framework☆42Feb 11, 2024Updated 2 years ago
- Bugs Framework☆10Updated this week
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- Meta-Reinforcement Learning with Policy Residual Representation☆11Aug 15, 2019Updated 6 years ago
- Python Logix Designer SDK Wrapper☆10Jan 24, 2025Updated last year
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆110Mar 14, 2018Updated 7 years ago
- Official Cpp implementation of the Ambr protocol http://www.ambr.org/☆12Nov 20, 2018Updated 7 years ago
- Stochastic Markov Games☆12Oct 5, 2017Updated 8 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Nov 16, 2020Updated 5 years ago
- Code for manipulating flashmap (fmap) data structure used in ChromiumOS☆10Dec 11, 2019Updated 6 years ago
- Illustrations of codeql's AST☆12Sep 10, 2021Updated 4 years ago
- Notes and work-in-progress for BPF-related research projects☆12Jan 10, 2025Updated last year
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- AIxCC: automated vulnerability repair via LLMs, search, and static analysis☆11Jul 16, 2024Updated last year