Using nmap NSE scripts for identifying common ICS protocols[使用nmap的nse脚本对常见工控协议进行识别,附对应nse脚本,并记录pcap流量]
☆154Sep 3, 2020Updated 5 years ago
Alternatives and similar repositories for ICS-Protocol-identify
Users that are interested in ICS-Protocol-identify are comparing it to the libraries listed below
Sorting:
- ICS Common Protocol Simulator工控常见协议模拟工具集☆56Mar 23, 2020Updated 5 years ago
- Using Python script instead of Nmap NSE script to detect ICS protocols[根据nmap nse脚本来编写工控协议识别的python脚本]☆33Sep 3, 2020Updated 5 years ago
- ICS/SCADA Security Resource(整合工控安全相关资源)☆949Jan 4, 2019Updated 7 years ago
- 使用pyspider爬虫框架爬取工控相关数据(漏洞、预警、安全事件等)☆70Sep 3, 2020Updated 5 years ago
- ☆82Apr 9, 2021Updated 4 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆17Oct 24, 2020Updated 5 years ago
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆150Oct 2, 2020Updated 5 years ago
- A collection of ICS/SCADA PCAPs☆540Jan 3, 2020Updated 6 years ago
- Digital Bond's ICS Enumeration Tools☆460Mar 10, 2020Updated 5 years ago
- my personal shell set up script-我的超好看的oh-my-zsh配置☆22Sep 29, 2021Updated 4 years ago
- Suricata IDS rules 用来检测红队渗透/恶意行为等,支持检测CobaltStrike/MSF/Empire/DNS隧道/Weevely/菜刀/冰蝎/挖矿/反弹shell/ICMP隧道等☆1,261Jul 8, 2023Updated 2 years ago
- It can analyse the packets of ICS☆22Jun 2, 2018Updated 7 years ago
- ☆64Sep 5, 2017Updated 8 years ago
- Tools, tips, tricks, and more for exploring ICS Security.☆1,924Apr 15, 2025Updated 10 months ago
- 工控态势感知工具 Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks…☆10Sep 10, 2017Updated 8 years ago
- a safedog fuzzing python script☆18Apr 15, 2018Updated 7 years ago
- ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python☆1,092Jan 4, 2024Updated 2 years ago
- 工控CTF比赛工具,各种网络数据包处理脚本☆122Aug 9, 2018Updated 7 years ago
- IDS协议识别测试流量☆21Feb 19, 2019Updated 7 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- A set of ICS IDS rules for use with Suricata.☆51Oct 13, 2023Updated 2 years ago
- 窃取mstsc中的用户明文凭据☆47Apr 23, 2021Updated 4 years ago
- Monitor and prevent unexpected behavior of Java programs.☆14Jul 6, 2021Updated 4 years ago
- ThinkCMF 框架上的任意内容包含漏洞☆36Oct 28, 2019Updated 6 years ago
- oauth2研究: 实现代码、漏洞利用、修复方案☆19May 21, 2019Updated 6 years ago
- Python3 Reverse Shell☆13May 24, 2019Updated 6 years ago
- WeblogicScanLot系列,Weblogic漏洞批量检测工具,V2.2☆184Aug 1, 2020Updated 5 years ago
- Defense Evasion & Bypass AntiVirus reference☆74Mar 28, 2021Updated 4 years ago
- 一个Burp插件,实现用AES算法透明加密原版菜刀Caidao.exe与服务器端交互的http数据流☆79Jan 19, 2019Updated 7 years ago
- 对公网IP列表进行端口服务扫描,发现周期内的端口服务变化情况和弱口令安全风险☆609Apr 12, 2021Updated 4 years ago
- 检测目标Mysql数据库是不是蜜罐☆128Feb 23, 2021Updated 5 years ago
- ☆13Oct 27, 2020Updated 5 years ago
- Fixes and patches☆20Dec 3, 2020Updated 5 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 5 years ago
- ☆13Apr 11, 2018Updated 7 years ago
- Jenkins凭据解密脚本,增加对publish_over_ssh插件支持☆54Sep 23, 2020Updated 5 years ago
- Explore Indicators of Compromise Automatically☆96Feb 27, 2020Updated 6 years ago
- cobaltstrike插件☆182Mar 11, 2021Updated 4 years ago
- 🚀 A simple asset discovery engine for cybersecurity. (网络资产发现引擎)☆1,342Dec 8, 2022Updated 3 years ago