pesco / dnp3
A DNP3 parser implementation in Hammer
☆15Updated 9 years ago
Alternatives and similar repositories for dnp3
Users that are interested in dnp3 are comparing it to the libraries listed below
Sorting:
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Updated 11 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- ☆29Updated 8 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆86Updated 7 years ago
- ☆113Updated 8 years ago
- Dynamic security analysis of embedded systems’ firmwares☆81Updated 8 years ago
- ☆21Updated 7 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 8 years ago
- CANBus protection used to isolate third party systems requiring OBDII access.☆19Updated 10 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆194Updated 7 years ago
- Modified edition of cuckoo community modules☆50Updated 8 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- malware-traffic-analysis.net PCAPs repository.☆35Updated 8 years ago
- Scripts for dealing with various ek's☆69Updated 8 years ago
- ActionScript3 dynamic instrumentation tool☆36Updated 8 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Updated last year
- Volatility plugins☆12Updated 10 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆155Updated 5 years ago
- Dockerized Cuckoo build☆10Updated 8 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- IDATACO IDA Pro Plugin☆47Updated 8 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- Bit9 + Carbon Black Threat Intelligence☆82Updated 9 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆162Updated this week
- Triconex TriStation utilities and tools☆74Updated 6 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆55Updated 9 years ago
- Industrial Control Systems Network Scanner☆23Updated 9 years ago
- ☆21Updated 9 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 8 years ago