ICSGoat: A Damn Vulnerable ICS Infrastructure
☆32Aug 26, 2024Updated last year
Alternatives and similar repositories for ICSGoat
Users that are interested in ICSGoat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ICS/OT related Wireshark profiles + adding some other (IT or OT related) Open Source Wireshark Profiles☆18Mar 21, 2025Updated last year
- python framework to parse logs for IR☆15May 2, 2021Updated 4 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- Beer-ISAC Community Resources☆26Jan 22, 2021Updated 5 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- ICS Security Labs☆38Mar 27, 2021Updated 4 years ago
- Modbus TCP vulnerability demonstration☆16Jan 22, 2020Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆35Feb 9, 2025Updated last year
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated last month
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆46Feb 2, 2023Updated 3 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- Running nextcloud + traefik + bitwarden on localhost with docker☆10Mar 22, 2020Updated 6 years ago
- My personal OT resource list, gather throughout research and internet adventure.☆137Nov 21, 2025Updated 4 months ago
- ModBus RTU for Flipper Zero☆26Jan 2, 2026Updated 2 months ago
- GitHub Repository for the HW CWE SIG☆17Mar 3, 2026Updated 2 weeks ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆28Sep 23, 2025Updated 6 months ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- Specialized testing tool designed to identify vulnerabilities and bugs in OPC UA (Open Platform Communications Unified Architecture) impl…☆43Feb 4, 2026Updated last month
- A tool to interact with the Modbus protocols☆83Apr 20, 2024Updated last year
- Modbus tap/tun tunneler, for making arbitrary ethernet connections over Modbus/TCP.☆12Dec 17, 2012Updated 13 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆11Updated this week
- We want to parse the from the host/dist or in the mid to analysis the network communication protocol to identify whether the communicati…☆14Feb 24, 2026Updated 3 weeks ago
- Tools demonstrated at DEF CON 26 talk "Hacking PLCs and Causing Havoc on Critical Infrastructures"☆49Aug 10, 2018Updated 7 years ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- A set of ICS IDS rules for use with Suricata.☆52Oct 13, 2023Updated 2 years ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆61Oct 17, 2023Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Feb 26, 2026Updated 3 weeks ago
- Operational Technology (OT) Simulator☆55Oct 6, 2025Updated 5 months ago
- ☆18Oct 1, 2025Updated 5 months ago
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- AI Goat - Learn AI security by attacking and defending a real AI-powered e-commerce application. Built for Red Teamers, security research…☆25Mar 14, 2026Updated last week
- This is Web Application Penetration Testing Report made for everybody who wanted a glance of how to make a professional report for pentet…☆18Sep 3, 2021Updated 4 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆31Feb 12, 2026Updated last month