Snort rules
☆11Oct 22, 2015Updated 10 years ago
Alternatives and similar repositories for SCADA-Rules
Users that are interested in SCADA-Rules are comparing it to the libraries listed below
Sorting:
- Malmod☆14Jan 19, 2020Updated 6 years ago
- Suricata rules for SCADA☆16Jun 4, 2022Updated 3 years ago
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆150Oct 2, 2020Updated 5 years ago
- Wireshark dissector for wirelessHART☆13Aug 2, 2017Updated 8 years ago
- Modbus TCP vulnerability demonstration☆15Jan 22, 2020Updated 6 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆17Oct 24, 2020Updated 5 years ago
- ICS/SCADA nmap script.☆18May 17, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/plcscan☆18Sep 5, 2015Updated 10 years ago
- SCADA network attack datasets and process logs☆20May 2, 2017Updated 8 years ago
- Zeek Ethernet/IP and CIP Parser - CISA ICSNPP☆26Nov 6, 2025Updated 3 months ago
- Material from my ICS Village talk at DEFCON 25☆24Jul 28, 2017Updated 8 years ago
- ☆22May 11, 2022Updated 3 years ago
- This is an open source Snort rules repository☆30May 31, 2022Updated 3 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆64Mar 1, 2017Updated 9 years ago
- ☆30Dec 4, 2021Updated 4 years ago
- DNP3 Protocol - Outstation Server Simulator, Client Master Simulator, Source Code for Windows and Linux (ARM) -C, C++, C# .NET core, Pyth…☆74Jan 19, 2026Updated last month
- Discovering all CIP communicating devices on a network☆11Dec 18, 2024Updated last year
- a lightweight dns-over-tls proxy (WIP)☆10Jun 1, 2020Updated 5 years ago
- Zeek network security monitor plugin that enables parsing of the Profinet protocol☆30May 30, 2024Updated last year
- REST API (CRUD) with Express implemented with Typescript. Using MYSQL Data Base connector and Data Access Object as Design Pattern at Dat…☆11Jun 14, 2018Updated 7 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Locates Honeywell/Tridium/Niagara HVAC JACEs/Controllers via HTTP fingerprints/strings. Very handy for vulnerability/pentesting.☆43Jan 9, 2017Updated 9 years ago
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 9 months ago
- Example of using Express & Node.js with HTTPS.☆10Feb 17, 2018Updated 8 years ago
- Wireshark dissector for GE-FANUC Service Request Transfer Protocol☆11Jan 7, 2023Updated 3 years ago
- Hack for hiding pointer in Wayland for when your using it as a kiosk☆10Aug 12, 2019Updated 6 years ago
- An app which reads data from a serial port and serves it on a TCP port.☆11Oct 7, 2023Updated 2 years ago
- Start writing your portfolio easily and fun.☆10Sep 29, 2023Updated 2 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆256Oct 9, 2020Updated 5 years ago
- Get your context value faster☆10Nov 24, 2020Updated 5 years ago
- blog☆16Dec 24, 2025Updated 2 months ago
- Write and read JSON from different sources in one line☆10Apr 7, 2020Updated 5 years ago
- Serial monitor in rust☆14Jul 24, 2024Updated last year
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- A file upload library for Go.☆10Dec 22, 2019Updated 6 years ago
- Simple TCP<->RTU Modbus Gateway Server☆14Aug 5, 2023Updated 2 years ago
- sidecore lets you run IoT systems, using flattened docker images from github.com/u-root/sidecore-images, as easily as you run a shell scr…☆10Jun 20, 2025Updated 8 months ago
- NMAP扫描网络资产自动导入到Elasticstack进行展示☆11Apr 25, 2020Updated 5 years ago