ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python
☆1,092Jan 4, 2024Updated 2 years ago
Alternatives and similar repositories for isf
Users that are interested in isf are comparing it to the libraries listed below
Sorting:
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆256Oct 9, 2020Updated 5 years ago
- ICS/SCADA Security Resource(整合工控安全相关资源)☆947Jan 4, 2019Updated 7 years ago
- Tools, tips, tricks, and more for exploring ICS Security.☆1,924Apr 15, 2025Updated 10 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆1,932Oct 10, 2025Updated 4 months ago
- Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in suppo…☆1,033Feb 24, 2020Updated 6 years ago
- ICS/SCADA honeypot☆1,431Dec 24, 2024Updated last year
- Digital Bond's ICS Enumeration Tools☆460Mar 10, 2020Updated 5 years ago
- A collection of ICS/SCADA PCAPs☆540Jan 3, 2020Updated 6 years ago
- The tool for enumerating Siemens S7 PLCs through TCP/IP or LLC network☆150Dec 28, 2018Updated 7 years ago
- Graphical Realism Framework for Industrial Control Simulations☆225Jun 20, 2024Updated last year
- ☆98Aug 8, 2015Updated 10 years ago
- Moki Distribution - ICS/SCADA Tools☆113Jul 18, 2017Updated 8 years ago
- AntiVirus Evasion Tool☆1,741Apr 23, 2025Updated 10 months ago
- ☆215Jan 14, 2016Updated 10 years ago
- Fuzzing framework written in python☆434Aug 4, 2024Updated last year
- Exploitation Framework for Embedded Devices☆13,002Jun 10, 2025Updated 8 months ago
- ToolSet for VxWorks Based Embedded Device Analyses☆378Sep 24, 2024Updated last year
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆150Oct 2, 2020Updated 5 years ago
- Vulnerability Labs for security analysis☆1,170Mar 10, 2021Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- SCADA StrangeLove Default/Hardcoded Passwords List☆518Nov 14, 2016Updated 9 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,449Nov 20, 2025Updated 3 months ago
- Proof of Concepts☆1,322Nov 12, 2024Updated last year
- Attify OS - Distro for pentesting IoT devices☆1,020Aug 26, 2021Updated 4 years ago
- A fork and successor of the Sulley Fuzzing Framework☆2,316Feb 15, 2026Updated 2 weeks ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆169May 23, 2018Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆152Oct 20, 2018Updated 7 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,043Nov 24, 2019Updated 6 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆110Mar 14, 2018Updated 7 years ago
- ✍️ A curated list of CVE PoCs.☆3,481Jan 4, 2022Updated 4 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,217Aug 2, 2024Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,818Jan 19, 2020Updated 6 years ago
- windows-kernel-exploits Windows平台提权漏洞集合☆8,596Jun 11, 2021Updated 4 years ago
- nse scripts for scada identification☆131Dec 16, 2013Updated 12 years ago
- MS17-010☆2,231Jun 20, 2023Updated 2 years ago
- Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware☆242May 4, 2021Updated 4 years ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,534Sep 16, 2024Updated last year
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago