azizulhakim / u-pot
Honeypot framework for UPnP Device
☆14Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for u-pot
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆10Updated 5 years ago
- ☆14Updated 7 years ago
- Passive ICS Network Scanner based on MAC Address Detection☆17Updated 4 years ago
- NVD/CVE as JSON files☆107Updated this week
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆38Updated 4 months ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 4 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Updated 2 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆11Updated 3 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 2 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆98Updated 3 years ago
- Standardized Malware Analysis Tool☆51Updated 3 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆102Updated 6 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Updated 4 years ago
- URGENT/11 detection tool by Armis☆60Updated 5 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- This repository contains dynamic and static tools for IoT malware analysis☆20Updated 2 years ago
- IoT and Operational Technology Honeypot☆105Updated last year
- The IoT honeypot (Master's Thesis)☆8Updated 5 years ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆71Updated 3 years ago
- Automatically exported from code.google.com/p/plcscan☆56Updated 9 years ago
- Presentations from the CX Security Labs team☆32Updated last month
- Low interaction MySQL honeypot written in C☆32Updated this week
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆37Updated 4 months ago
- ☆103Updated 3 months ago
- HN Security's advisories.☆21Updated 3 weeks ago
- Open source tools for realistic-behaving electric grid honeynets☆56Updated 9 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆60Updated 7 years ago
- ☆16Updated 8 months ago