Siemens Simatic S7 Metasploit Modules
☆41Jul 14, 2012Updated 13 years ago
Alternatives and similar repositories for s7-metasploit-modules
Users that are interested in s7-metasploit-modules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆151Oct 2, 2020Updated 5 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Dec 7, 2023Updated 2 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- random scripts for random things☆13Mar 3, 2026Updated 2 months ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Modbus stager in assembly and some scripts to upload/download data to the holding register of a PLC☆44Jun 10, 2020Updated 5 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 5 years ago
- ☆20Nov 22, 2016Updated 9 years ago
- libssh CVE-2018-10933☆22Oct 20, 2018Updated 7 years ago
- Moki Distribution - ICS/SCADA Tools☆114Jul 18, 2017Updated 8 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- ☆99Aug 8, 2015Updated 10 years ago
- Modbus Protocol Fuzzer☆50Oct 4, 2025Updated 7 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆31Feb 15, 2017Updated 9 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- Masters of IT project, network attacks against Profinet SCADA systems.☆32Sep 15, 2016Updated 9 years ago
- IEC104 Client for Metasploit☆11Aug 6, 2018Updated 7 years ago
- Public Code for ICS Evasion Attack Generation☆43Apr 23, 2021Updated 5 years ago
- Material from my ICS Village talk at DEFCON 25☆24Jul 28, 2017Updated 8 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Ruby gem to check to see if an email address is on http://haveibeenpwned.com☆17Oct 26, 2017Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- ☆13Oct 27, 2020Updated 5 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- android kernel disassembler based on MAME emulator code☆39Nov 26, 2013Updated 12 years ago
- Triconex TriStation utilities and tools☆81Jan 21, 2019Updated 7 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 11 years ago
- Some debug notes and exploit(not blind)☆39Jul 28, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Industrial Hacking Simulator☆27Feb 21, 2026Updated 2 months ago
- Industrial control Security Tool☆77Feb 28, 2021Updated 5 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- A dumb script for finding dumb coding errors in WordPress plugins☆53Jun 15, 2022Updated 3 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 11 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago