Collection of resources for Industrial control system cybersecurity
☆16May 30, 2022Updated 3 years ago
Alternatives and similar repositories for ICS_repo
Users that are interested in ICS_repo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An assessment tool to interact with Velocio PLCs☆13Sep 24, 2021Updated 4 years ago
- A Low-cost ICS Security Testbed for Education and Research☆119Mar 16, 2024Updated 2 years ago
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Mar 3, 2026Updated 2 weeks ago
- Get USB Devices from Registry hives☆22Nov 15, 2021Updated 4 years ago
- A collection of ICS/SCADA PCAPs☆542Jan 3, 2020Updated 6 years ago
- PMR - PT & VA Management & Reporting is a collaboration platform for pen-testing. PMR Platform is maintained by @SabrySecurity https://sa…☆12Jun 7, 2023Updated 2 years ago
- ☆18Apr 15, 2024Updated last year
- ISAF aims to be a framework that provides the necessary tools for the correct security audit of industrial environments. This repo is a m…☆59Nov 13, 2023Updated 2 years ago
- A Centralized Wiki for CTF Organization☆10Sep 22, 2021Updated 4 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- Zeek Ethercat Parser - CISA ICSNPP☆18Mar 3, 2026Updated 2 weeks ago
- Toolkit collection developed to help malware analysts dissecting and detecting the packer used by GreyEnergy samples.☆16Jan 25, 2019Updated 7 years ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆198May 10, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- ICS Cybersecurity PCAP respository☆63Jan 30, 2019Updated 7 years ago
- Presentation slides, blogs, and videos of my conference presentations.☆26Jan 31, 2024Updated 2 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆32Sep 4, 2024Updated last year
- Slides and code from my track B talk "Build Your Own Programming Language with JavaScript"☆24Apr 20, 2010Updated 15 years ago
- ps-like .NET Assembly for enumerating processes on the current machine or a remote machine.☆13Aug 12, 2019Updated 6 years ago
- Off-The-Record Messaging protocol implementation for Python☆14Mar 19, 2025Updated last year
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Using Python script instead of Nmap NSE script to detect ICS protocols[根据nmap nse脚本来编写工控协议识别的python脚本]☆33Sep 3, 2020Updated 5 years ago
- Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in suppo…☆1,035Feb 24, 2020Updated 6 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- ☆82Apr 9, 2021Updated 4 years ago
- A tool to interact with the Modbus protocols☆83Apr 20, 2024Updated last year
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Jan 23, 2024Updated 2 years ago
- Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware☆243May 4, 2021Updated 4 years ago
- A plain starter template that implements account management and community forum.☆19Oct 4, 2025Updated 5 months ago
- RACF Database Parser☆12Apr 4, 2024Updated last year
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated 3 weeks ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Scripts, tools and drivers for wardriving under Mac OSX☆14Dec 7, 2016Updated 9 years ago