mssabr01 / sixnet-toolsLinks
Tool for exploiting sixnet RTUs
☆16Updated 7 years ago
Alternatives and similar repositories for sixnet-tools
Users that are interested in sixnet-tools are comparing it to the libraries listed below
Sorting:
- IEC104 Client for Metasploit☆11Updated 7 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 9 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- Industrial Control Systems Network Scanner☆23Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- ☆26Updated 5 years ago
- Simple packet dissector that detects anomalous DNP3 traffic by analysing its parameters☆15Updated 9 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- A scoreboard for Security CTF events☆37Updated 12 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Modbus stager in assembly and some scripts to upload/download data to the holding register of a PLC☆43Updated 5 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- Automatically exported from code.google.com/p/modscan☆28Updated 10 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆107Updated 7 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆16Updated 7 years ago
- Main repository to pull all Cisco related projects.☆15Updated 8 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- API functions for Malware Research☆35Updated 6 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- CANAPE Network Testing Tool☆34Updated 7 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Updated 9 years ago
- A modular pentesting framework implemented in C☆14Updated 7 years ago
- Firmware analysis website + API☆43Updated 5 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago