ic3sw0rd / Codesys_V2_VulnerabilityView external linksLinks
☆19Jun 24, 2022Updated 3 years ago
Alternatives and similar repositories for Codesys_V2_Vulnerability
Users that are interested in Codesys_V2_Vulnerability are comparing it to the libraries listed below
Sorting:
- Unpacker for Siemens S7 1200 PLC firmware☆25Jan 14, 2022Updated 4 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- ☆117Aug 12, 2024Updated last year
- Client utility for Siemens S7 bootloader special access feature☆90Dec 3, 2020Updated 5 years ago
- Metasploit Modules for OPC UA☆35Apr 2, 2020Updated 5 years ago
- Penetration testing tool for ROS☆35Dec 2, 2022Updated 3 years ago
- Real world and CTFs exploiting web/binary POCs.☆79Jul 5, 2020Updated 5 years ago
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- Gojira is a record and replay framework for Java apps meant for regression testing. It provides complete recording capability within a si…☆13Feb 5, 2025Updated last year
- Sample files for Control Things Platform☆42May 10, 2025Updated 9 months ago
- rocksredis,主要面向工业互联网(物联网)传感器、终端采集的数据存储的场景应用☆12Sep 15, 2021Updated 4 years ago
- Wireshark dissector for GE-FANUC Service Request Transfer Protocol☆11Jan 7, 2023Updated 3 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- Zeek network security monitor plugin that enables parsing of the S7 protocol☆41May 30, 2024Updated last year
- ☆42Jan 19, 2026Updated 3 weeks ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- 🧠 A field guide to mnemonics for engineers: outages, RCAs, infra design, burnout, and conflict. Structured entries with when-to-use, pit…☆16Feb 1, 2026Updated last week
- Blockchain: Understanding Its Uses and Implications - Linux Foundation - LFS170x☆12Oct 26, 2024Updated last year
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last week
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Various shellcodes☆13Sep 1, 2020Updated 5 years ago
- PTF-based data plane tests for ONOS fabric.p4☆15Aug 6, 2021Updated 4 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Aug 11, 2023Updated 2 years ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 4 months ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- Scapy Robot Framework Library☆10Oct 22, 2019Updated 6 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- Security R package with a set of utils to analyse the different industry standards (MITRE and NIST).☆12May 27, 2019Updated 6 years ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- A cross-platform Golang GUI library. Use Delphi VCL and Lazarus LCL for binding.☆10Jan 22, 2019Updated 7 years ago
- TWinEventHook allows you to hook into certain Windows events.☆11Sep 20, 2019Updated 6 years ago
- overlay filesystem userspace utilities, include fsck.overlay which is used to check and optionally repair underlying directories of overl…☆14Jun 8, 2021Updated 4 years ago
- Code to make a Delphi program act as another user. Demo provide to access a file owned by another user.☆11Feb 8, 2022Updated 4 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆46Mar 8, 2023Updated 2 years ago