Snort rules
☆11Oct 22, 2015Updated 10 years ago
Alternatives and similar repositories for SCADA-Rules
Users that are interested in SCADA-Rules are comparing it to the libraries listed below
Sorting:
- Malmod☆14Jan 19, 2020Updated 6 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- Wireshark dissector for wirelessHART☆13Aug 2, 2017Updated 8 years ago
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆151Oct 2, 2020Updated 5 years ago
- This is an open source Snort rules repository☆30May 31, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/plcscan☆18Sep 5, 2015Updated 10 years ago
- Modbus TCP vulnerability demonstration☆16Jan 22, 2020Updated 6 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆64Mar 1, 2017Updated 9 years ago
- Material from my ICS Village talk at DEFCON 25☆24Jul 28, 2017Updated 8 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆17Oct 24, 2020Updated 5 years ago
- ☆22May 11, 2022Updated 3 years ago
- Start writing your portfolio easily and fun.☆10Sep 29, 2023Updated 2 years ago
- Zeek Ethernet/IP and CIP Parser - CISA ICSNPP☆26Mar 3, 2026Updated 2 weeks ago
- ICS/SCADA nmap script.☆18May 17, 2018Updated 7 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆31May 30, 2024Updated last year
- PySec Auditor is an open-source, Python-based tool designed to perform automated, fast, and informative web security audits. It was devel…☆23Nov 14, 2025Updated 4 months ago
- [OLD] Jolie, Croft, RabbitMQ and InfluxDB docker image☆12May 8, 2016Updated 9 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- Industrial Control Systems Protocol Decoders☆22Apr 30, 2014Updated 11 years ago
- A tool to hack webcam & capture images from it☆18Nov 19, 2023Updated 2 years ago
- Wireshark dissector for GE-FANUC Service Request Transfer Protocol☆11Jan 7, 2023Updated 3 years ago
- Discover and enumerate all PLC devices and applications via a snap☆13May 28, 2018Updated 7 years ago
- SCADA network attack datasets and process logs☆20May 2, 2017Updated 8 years ago
- This repository contains a set of rules samples that can be directly used with Trellix Endpoint Security, in the Exploit Prevention polic…☆29Feb 26, 2026Updated 3 weeks ago
- Acunetix Professional v24.1☆19Mar 2, 2024Updated 2 years ago
- LikeIt allows to like a web page ¯\_(ツ)_/¯☆10Apr 26, 2024Updated last year
- Automatically requests Lets Encrypt certificates and forwards to webserver. Add ssl to every website.☆11Oct 3, 2016Updated 9 years ago
- DNP3 Protocol - Outstation Server Simulator, Client Master Simulator, Source Code for Windows and Linux (ARM) -C, C++, C# .NET core, Pyth…☆74Jan 19, 2026Updated 2 months ago
- dataSet for kubAnomaly model☆19Mar 24, 2023Updated 2 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- OMRONのFINSプロトコルで通信する、PLCシュミレータ☆13Feb 6, 2017Updated 9 years ago
- Hack for hiding pointer in Wayland for when your using it as a kiosk☆10Aug 12, 2019Updated 6 years ago
- Material from ICS Village talk at DEFCON 25☆13Jul 30, 2018Updated 7 years ago
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- A cleaned dataset of PHP webshell from 17 webshell collection projects on Github☆22Nov 17, 2020Updated 5 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- NMAP扫描网络资产自动导入到Elasticstack进行展示☆11Apr 25, 2020Updated 5 years ago
- ☆30Dec 4, 2021Updated 4 years ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago