Man-in-the-middle made easy!
☆15Mar 25, 2020Updated 5 years ago
Alternatives and similar repositories for mme
Users that are interested in mme are comparing it to the libraries listed below
Sorting:
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Apr 24, 2023Updated 2 years ago
- ☆14Jun 1, 2023Updated 2 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Zeek Ethercat Parser - CISA ICSNPP☆18Nov 6, 2025Updated 4 months ago
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Nov 19, 2025Updated 3 months ago
- Zeek Modbus Extension Scripts - CISA ICSNPP☆20Dec 16, 2025Updated 2 months ago
- Zeek OPCUA Binary Parser - CISA ICSNPP☆21Nov 19, 2025Updated 3 months ago
- Zeek BACnet Parser - CISA ICSNPP☆22Nov 6, 2025Updated 4 months ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago
- Zeek Ethernet/IP and CIP Parser - CISA ICSNPP☆26Nov 6, 2025Updated 4 months ago
- Damn Vulnerable Chemical Process - Vinyl Acetate Monomer☆22Dec 13, 2015Updated 10 years ago
- ☆22May 11, 2022Updated 3 years ago
- Small collection of Active Directory pentesting tools.☆32Jan 29, 2024Updated 2 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆32Sep 4, 2024Updated last year
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Nov 17, 2015Updated 10 years ago
- Python / Scapy tool to analyze and interact with IEC 61850 Goose traffic☆37Dec 15, 2021Updated 4 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆31May 30, 2024Updated last year
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- A thin async wrapper for SQLAlchemy sessions☆10Sep 13, 2021Updated 4 years ago
- System Validation Platform☆12Sep 18, 2025Updated 5 months ago
- Material for a tutorial on Bayesian analysis of survey data☆12Dec 30, 2025Updated 2 months ago
- Searchable index of Renaissance artworks☆13Mar 10, 2020Updated 5 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Aug 5, 2023Updated 2 years ago
- Vulnerabilities, exploits, and PoCs☆37Jan 16, 2026Updated last month
- ☆10Mar 4, 2022Updated 4 years ago
- A C++ PMU and/or PDC Stream Simulator for IEEE C37.118.2☆12May 21, 2019Updated 6 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆16Dec 8, 2025Updated 2 months ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41May 30, 2024Updated last year
- Claroty's Public Tools☆39Mar 11, 2020Updated 5 years ago
- GUI and command line application for downloading large data volumes from PI Historian☆11Nov 8, 2023Updated 2 years ago
- Easily set Mac Retina display to higher unsupported resolutions☆12Feb 5, 2023Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Generate malware with AI☆99Feb 27, 2026Updated last week
- scavenger is a ruby brute forcing script that uses Typhoeus gem to enable parallelization and sends multiple http requests with various p…☆12Aug 25, 2021Updated 4 years ago
- psPAS Example scripts & code☆11Jul 19, 2020Updated 5 years ago