cutaway-security / goosestalkerLinks
Python / Scapy tool to analyze and interact with IEC 61850 Goose traffic
☆37Updated 4 years ago
Alternatives and similar repositories for goosestalker
Users that are interested in goosestalker are comparing it to the libraries listed below
Sorting:
- ☆22Updated 3 years ago
- ICS TestBed Framework☆69Updated 7 years ago
- Triconex TriStation utilities and tools☆80Updated 7 years ago
- Wireshark dissector for wirelessHART☆13Updated 8 years ago
- Zeek Ethernet/IP and CIP Parser - CISA ICSNPP☆26Updated 2 months ago
- DNP3 Cyber-attack datasets☆14Updated 8 years ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆46Updated last year
- Zeek OPCUA Binary Parser - CISA ICSNPP☆21Updated 2 months ago
- ☆60Updated last year
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Updated 2 years ago
- ☆25Updated 11 years ago
- Zeek network security monitor plugin that enables parsing of the BACnet standard building controls protocol☆30Updated 8 months ago
- A collection of ICS/SCADA PCAPs☆30Updated 5 years ago
- Zeek Ethercat Parser - CISA ICSNPP☆18Updated 2 months ago
- A Low-cost ICS Security Testbed for Education and Research☆118Updated last year
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆14Updated 6 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 9 years ago
- Zeek Modbus Extension Scripts - CISA ICSNPP☆20Updated last month
- Zeek BACnet Parser - CISA ICSNPP☆22Updated 2 months ago
- IEC104 Client for Metasploit☆11Updated 7 years ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41Updated last year
- Masters of IT project, network attacks against Profinet SCADA systems.☆31Updated 9 years ago
- Public Code for ICS Evasion Attack Generation☆44Updated 4 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 10 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆63Updated 8 years ago
- A set of ICS IDS rules for use with Suricata.☆51Updated 2 years ago
- Passive ICS Network Scanner based on MAC Address Detection☆20Updated 5 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 5 years ago
- ICS Cybersecurity PCAP respository☆62Updated 6 years ago
- ☆31Updated 8 years ago