mssabr01 / sixnet-toolsLinks
Tool for exploiting sixnet RTUs
☆16Updated 7 years ago
Alternatives and similar repositories for sixnet-tools
Users that are interested in sixnet-tools are comparing it to the libraries listed below
Sorting:
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- IEC104 Client for Metasploit☆11Updated 6 years ago
- Simple packet dissector that detects anomalous DNP3 traffic by analysing its parameters☆15Updated 9 years ago
- ☆23Updated 4 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆25Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Common Industrial Protocol based device scanner over the internet☆24Updated 9 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Updated 9 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- ☆15Updated 8 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Python FTP Fuzzer and Ability FTP Server POC☆8Updated 10 years ago
- Industrial Control Systems Network Scanner☆23Updated 9 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- ModbusTCP Fuzzing and DoS Tool.☆10Updated 4 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 8 years ago
- Presentation Slides and Resources☆16Updated last year
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago