CANBus protection used to isolate third party systems requiring OBDII access.
☆19Mar 18, 2015Updated 10 years ago
Alternatives and similar repositories for canbus-protector
Users that are interested in canbus-protector are comparing it to the libraries listed below
Sorting:
- Miscellaneous scripts for analyzing protocols and systems☆14Jun 24, 2016Updated 9 years ago
- Command line utilities for analyzing CANbus traffic☆74Jul 2, 2015Updated 10 years ago
- Setup instructions for getting a Beaglebone Black ready for CANBus hacking fun☆46Dec 23, 2015Updated 10 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆64Mar 1, 2017Updated 9 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- Discover and enumerate all PLC devices and applications via a snap☆13May 28, 2018Updated 7 years ago
- UMASploit - ClearEnergy modules☆16Apr 14, 2017Updated 8 years ago
- Modbus tap/tun tunneler, for making arbitrary ethernet connections over Modbus/TCP.☆12Dec 17, 2012Updated 13 years ago
- Cloned from now gone Digitalbond page.☆15Aug 23, 2016Updated 9 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 8 years ago
- Small script to retrieve passwords from many types of Moxa device, including NPort, OnCell, MGate, etc.☆37Jan 17, 2017Updated 9 years ago
- splonebox - open source network assessment tool with focus on modularity☆24Dec 5, 2018Updated 7 years ago
- SCADA network attack datasets and process logs☆20May 2, 2017Updated 8 years ago
- Focus on ICS, providing the latest ICS consulting, research, services(专注工控网络安全,提供最新的工控网络安全咨询、研究、服务)☆19Mar 17, 2018Updated 7 years ago
- A set of ICS IDS rules for use with Suricata.☆51Oct 13, 2023Updated 2 years ago
- ☆25Feb 12, 2015Updated 11 years ago
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆150Oct 2, 2020Updated 5 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- A tool to interact with the Modbus protocols☆83Apr 20, 2024Updated last year
- Modbus VCR☆28Oct 6, 2017Updated 8 years ago
- Locates Honeywell/Tridium/Niagara HVAC JACEs/Controllers via HTTP fingerprints/strings. Very handy for vulnerability/pentesting.☆43Jan 9, 2017Updated 9 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- MALM: Malware Monitor☆49Jun 14, 2013Updated 12 years ago
- Don't just be a script Kiddie☆11Apr 19, 2023Updated 2 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- McAfee Active Response (MAR) client library for use with the OpenDXL Python Client☆10Mar 17, 2020Updated 5 years ago
- 用于自动化检测CTF中常出现得工具图片隐写题目☆10Feb 6, 2021Updated 5 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Repository for team's work on the Microsoft Malware Classification Challenge Kaggle competition.☆11Mar 17, 2015Updated 10 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- pathscanner☆14Jun 5, 2015Updated 10 years ago
- CAN Firewall project☆13Dec 17, 2015Updated 10 years ago
- distributed nmap using Celery☆11Mar 17, 2017Updated 8 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago