momalab / ICSREFLinks
A tool for reverse engineering industrial control systems binaries.
☆173Updated last year
Alternatives and similar repositories for ICSREF
Users that are interested in ICSREF are comparing it to the libraries listed below
Sorting:
- Client utility for Siemens S7 bootloader special access feature☆89Updated 4 years ago
- ☆28Updated 3 years ago
- Tools demonstrated at DEF CON 26 talk "Hacking PLCs and Causing Havoc on Critical Infrastructures"☆48Updated 7 years ago
- modbus fuzzer based on boofuzz framework.!! Cool☆30Updated 2 months ago
- ☆37Updated 2 years ago
- Library to disassemble MC7 bytecode for Siemens PLC SIMATIC S7-300 and S7-400☆44Updated 8 months ago
- ☆97Updated 10 years ago
- EtherNet/IP+CIP dissector for Scapy☆99Updated 8 years ago
- ☆18Updated 3 years ago
- ☆163Updated 4 years ago
- Masters of IT project, network attacks against Profinet SCADA systems.☆30Updated 9 years ago
- Siemens SIMATIC vulnerabilities☆22Updated 3 years ago
- UMASploit - ClearEnergy modules☆16Updated 8 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆107Updated 7 years ago
- NEtwork MEssage Syntax analysYS (WOOT 2018) and NEtwork MEssage TYpe identification by aLignment (INFOCOM 2020)☆57Updated last year
- Polar : Function Code Aware Fuzz Testing of ICS Protocol☆33Updated 4 years ago
- ☆211Updated 9 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- High-interaction Honeypot for PLCs and Industrial Control Systems☆89Updated 2 years ago
- Unpacker for Siemens S7 1200 PLC firmware☆20Updated 3 years ago
- Exploiting Allen-Bradley E/IP PLCs☆76Updated 5 years ago
- Avatar² examples showcased in "Avatar²: A Multi-target Orchestration Platform"☆18Updated 7 years ago
- ISAF aims to be a framework that provides the necessary tools for the correct security audit of industrial environments. This repo is a m…☆58Updated last year
- Automatic modeling of hardware to enable the rehosting of embedded firmware☆86Updated last year
- Material from ICS Village talk at DEFCON 25☆12Updated 7 years ago
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆140Updated 2 years ago
- ☆13Updated 3 years ago
- ☆113Updated last year
- ☆27Updated 4 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆63Updated 8 years ago