Automatically exported from code.google.com/p/modscan
☆29Sep 5, 2015Updated 10 years ago
Alternatives and similar repositories for modscan
Users that are interested in modscan are comparing it to the libraries listed below
Sorting:
- Automatically exported from code.google.com/p/plcscan☆18Sep 5, 2015Updated 10 years ago
- A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.☆11Jun 11, 2022Updated 3 years ago
- Tools to install w3af as a Python module☆10Jul 24, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/plcscan☆60Mar 23, 2015Updated 10 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- A framework for parsing binary data.☆18Aug 12, 2022Updated 3 years ago
- MODBUS Penetration Testing Framework☆92Jan 14, 2016Updated 10 years ago
- ☆51Jun 11, 2019Updated 6 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆45Sep 29, 2014Updated 11 years ago
- MiniCPS: a framework for Cyber-Physical Systems real-time simulation, built on top of mininet☆187Sep 19, 2025Updated 5 months ago
- nse scripts for scada identification☆131Dec 16, 2013Updated 12 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- Discovering all CIP communicating devices on a network☆11Dec 18, 2024Updated last year
- A tool to interact with the Modbus protocols☆83Apr 20, 2024Updated last year
- ☆10Sep 10, 2025Updated 5 months ago
- Examples for the HEBI Robotics Python API☆14Jan 9, 2026Updated last month
- Locates Honeywell/Tridium/Niagara HVAC JACEs/Controllers via HTTP fingerprints/strings. Very handy for vulnerability/pentesting.☆43Jan 9, 2017Updated 9 years ago
- gcnano-binaries☆11Feb 9, 2026Updated 2 weeks ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- ECED440 Computer Security☆11Nov 6, 2024Updated last year
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- Satellite Tracking / RF recording / Processing☆10Updated this week
- This library is for simplified work with the sms-man.com API☆18Jan 18, 2022Updated 4 years ago
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- Hub dashboard widget to display a list of YouTrack issues that match a search query☆12Jun 10, 2025Updated 8 months ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- TETRAPOL radio kit☆10Jul 19, 2021Updated 4 years ago
- WebAnalyzer is a versatile tool for comprehensive domain analysis. It provides insights into WHOIS data, DNS records, subdomains, SEO, we…☆13Oct 6, 2025Updated 4 months ago
- Example of using Express & Node.js with HTTPS.☆10Feb 17, 2018Updated 8 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- ☆38Mar 20, 2017Updated 8 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- FM MPX Power Monitor (GNU Radio)☆11May 18, 2019Updated 6 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- ☆11Jun 2, 2015Updated 10 years ago
- Vulnerability management tool that provides Buildroot SBOM generation and CVE Analysis of target images.☆11Jan 2, 2026Updated 2 months ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 2 weeks ago