hi-zer / Industrial-protocols-datasetLinks
This is an industrial dataset contains eight different types of ICS protocols, mainly collected for the evaluation of protocol reverse engineering tools. We hope it can be supplemented in the future.
☆11Updated last year
Alternatives and similar repositories for Industrial-protocols-dataset
Users that are interested in Industrial-protocols-dataset are comparing it to the libraries listed below
Sorting:
- Re-implementation of the protocol reverse engineering approach FieldHunter☆16Updated 2 years ago
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆56Updated last year
- A protocol reverse engineering tool for industrial binary protocol based on pin tool☆17Updated 4 years ago
- Modbus Dataset from CSET 2016☆48Updated 2 years ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆72Updated last year
- ICS/SCADA Security Resource(整合工控安全相关资源)☆939Updated 6 years ago
- ☆22Updated last year
- ☆13Updated 3 years ago
- ICS Common Protocol Simulator工控常见协议模拟工具集☆55Updated 5 years ago
- ☆25Updated 3 years ago
- ☆46Updated 6 years ago
- ☆32Updated 2 years ago
- EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification☆18Updated 4 years ago
- 在学习使用peach进行模糊测试时,搜集到的一些不错的资料,以及配套的一些软件或脚本。☆328Updated 5 years ago
- ☆28Updated 3 years ago
- Using nmap NSE scripts for identifying common ICS protocols[使用nmap的nse脚本对常见工控协议进行识别,附对应nse脚本,并记录pcap流量]☆150Updated 5 years ago
- EtherNet/IP+CIP dissector for Scapy☆98Updated 8 years ago
- Malmod☆14Updated 5 years ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆53Updated 3 years ago
- FirmSec Dataset☆39Updated 3 years ago
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Updated last year
- A prototype of Shared-keywords aware Taint Checking, a novel static analysis approach that tracks the data flow of the user input between…☆315Updated 9 months ago
- SCADA network attack datasets and process logs☆20Updated 8 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆33Updated last year
- modbus fuzzer based on boofuzz framework.!! Cool☆30Updated last month
- VulDeePecker algorithm implemented in Python☆113Updated 6 years ago
- ☆341Updated 10 months ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆332Updated 4 years ago
- ☆26Updated 6 years ago
- A tool for reverse engineering industrial control systems binaries.☆170Updated last year