List of groups that are carrying out cyber actions in the conflict between Israel and Iran.
☆31Feb 12, 2026Updated last month
Alternatives and similar repositories for IsraelIranConflict
Users that are interested in IsraelIranConflict are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.☆30Apr 23, 2024Updated last year
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github …☆21Aug 11, 2024Updated last year
- GitHub Repository for the HW CWE SIG☆17Mar 3, 2026Updated 2 weeks ago
- ☆20Jan 14, 2026Updated 2 months ago
- A guide to osint research, including osint information and tools about japan. approaches to non-japanese speaking countries.☆39Jun 21, 2025Updated 9 months ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Updated this week
- We want to parse the from the host/dist or in the mid to analysis the network communication protocol to identify whether the communicati…☆14Feb 24, 2026Updated last month
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆18Mar 21, 2025Updated last year
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- Monitoring a high precision 10MHz GPS disciplined oscillator (GPSDO)☆14Dec 1, 2024Updated last year
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆14May 27, 2019Updated 6 years ago
- StepMania's Website, forums, etc.☆21Oct 10, 2017Updated 8 years ago
- Share files from windows to iOS devices using a local server.☆11May 12, 2025Updated 10 months ago
- IDA Taskr is a pure Python library for IDA Pro related parallel computing. It lets you use the power of Qt (built-in to IDA!) and Python'…☆29Feb 3, 2026Updated last month
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 10 months ago
- This is a collection of stealers for educational purposes☆22Aug 13, 2025Updated 7 months ago
- Artifact for the paper Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems at CPSIoTSec 202…☆13Nov 17, 2022Updated 3 years ago
- ☆18Aug 13, 2020Updated 5 years ago
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- Building a Computer From Scratch with verilog☆11Feb 6, 2026Updated last month
- Modular framework for automating triaging, malware analysis, and analyst workflows☆45May 2, 2025Updated 10 months ago
- TeaVin - Ultimate ESP32 EvilTwin☆13Mar 25, 2024Updated last year
- GPL Original Xbox kernel and library includes, sourced from Cxbx-Reloaded, Wine, OpenXDK☆24Jul 30, 2024Updated last year
- IPAnalyzer is an IP Address Tracker OSINT ethical hacking tool built for Linux distributions, designed to gather detailed information abo…☆59Nov 19, 2025Updated 4 months ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Mar 24, 2020Updated 6 years ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆32Aug 26, 2024Updated last year
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Arduino PS2 keyboard International Keyboard mapping from PS2KeyAdvanced and return as UTF-8☆14Mar 22, 2023Updated 3 years ago
- CVE-2024-28955 Exploitation PoC☆34Jul 1, 2024Updated last year
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆22Feb 11, 2026Updated last month
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated 10 months ago
- ☆14Apr 24, 2021Updated 4 years ago
- Developing an open source Windows EDR written in C & C++ & C#☆28Updated this week
- Burp Suite extension to passively scan for applications revealing server error messages☆16Aug 15, 2023Updated 2 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Nov 17, 2015Updated 10 years ago