desolat / scapy-bacnet
A BACnet layer for Scapy
☆13Updated 9 years ago
Alternatives and similar repositories for scapy-bacnet:
Users that are interested in scapy-bacnet are comparing it to the libraries listed below
- Cloned from now gone Digitalbond page.☆15Updated 8 years ago
- Presentation Slides and Resources☆16Updated 9 months ago
- BOF (Boiboite Opener Framework) is a testing framework for industrial protocols implementations and devices.☆48Updated last month
- CybatiWorks-1 ICS/SCADA/IoT/IT Cybersecurity Education Platform☆9Updated 9 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- Remote / Onsite Security Assessment Jumpkit☆38Updated last year
- EtherNet/IP & CIP Stack Detector☆45Updated 2 years ago
- Modbus VCR☆27Updated 7 years ago
- ☆40Updated last week
- Wireshark dissector for wirelessHART☆13Updated 7 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- PoC C&C for the Industroyer malware☆24Updated 7 years ago
- Miscellaneous scripts for analyzing protocols and systems☆13Updated 8 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Updated 3 years ago
- ☆12Updated 5 years ago
- Small script to retrieve passwords from many types of Moxa device, including NPort, OnCell, MGate, etc.☆36Updated 8 years ago
- Utility to inject honey tokens into lsass.☆27Updated 8 years ago
- Triconex TriStation utilities and tools☆74Updated 6 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- various slides and presentations I've worked on☆18Updated last week
- A collection of ICS/SCADA PCAPs☆26Updated 5 years ago
- Sample files for Control Things Platform☆38Updated 11 months ago
- SMB Named Pipe shell☆64Updated 4 months ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Automated 802.1x Bypass☆84Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 4 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago