fkie-cad / wattsonView external linksLinks
A co-simulation framework for reasearching cybersecurity in power grids.
☆26Sep 24, 2025Updated 4 months ago
Alternatives and similar repositories for wattson
Users that are interested in wattson are comparing it to the libraries listed below
Sorting:
- Wireshark dissector for wirelessHART☆13Aug 2, 2017Updated 8 years ago
- A Wireshark Plugin that dissects packets of the LIFX LAN Protocol.☆18Feb 24, 2018Updated 7 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- A curated list of resources related to Industrial Control System (ICS) security.☆21Aug 23, 2021Updated 4 years ago
- Zeek S7comm, S7comm-plus, and COTP Parser - CISA ICSNPP☆28Nov 19, 2025Updated 2 months ago
- A network scanning solution for information gathering in large IT/OT network environments.☆31Sep 15, 2025Updated 5 months ago
- A web frontend to libpcap spool directories as produced by tcpdump or daemonlogger.☆30Oct 29, 2025Updated 3 months ago
- DHCP Fingerprinting☆31Dec 15, 2020Updated 5 years ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Jun 29, 2023Updated 2 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- A python to Siemens WinCC interface.☆33Sep 13, 2017Updated 8 years ago
- Python / Scapy tool to analyze and interact with IEC 61850 Goose traffic☆37Dec 15, 2021Updated 4 years ago
- Modbus VCR☆27Oct 6, 2017Updated 8 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 8 months ago
- ☆15Sep 7, 2025Updated 5 months ago
- ☆15Aug 23, 2025Updated 5 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- Wireshark dissector for GE-FANUC Service Request Transfer Protocol☆11Jan 7, 2023Updated 3 years ago
- ☆10Mar 19, 2018Updated 7 years ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41May 30, 2024Updated last year
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆46Dec 22, 2023Updated 2 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Sep 29, 2022Updated 3 years ago
- A tool to integrate post-quantum secure TLS in NGINX using OpenSSL☆11Nov 15, 2021Updated 4 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 5 months ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆15Jun 22, 2024Updated last year
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Apr 24, 2023Updated 2 years ago
- QubesOS dom0 automation in Python☆12Aug 3, 2017Updated 8 years ago
- A BACnet layer for Scapy☆13Nov 25, 2015Updated 10 years ago
- vncreplay replays a VNC session from captured network traffic☆10Apr 15, 2025Updated 10 months ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Learn about cryptography concepts - Both basics and core.☆10Aug 9, 2024Updated last year
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago