sbaresearch / amlsec
Automated Security Risk Identification Using AutomationML-based Engineering Data
☆28Updated 2 years ago
Alternatives and similar repositories for amlsec:
Users that are interested in amlsec are comparing it to the libraries listed below
- Some of the presentations given by me☆18Updated 4 months ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆21Updated 3 months ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Industrial Security Checklist☆10Updated 8 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 11 months ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆15Updated 4 years ago
- Incident Response Collections☆10Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- NMAP NSE script for detecting devices that speak the Crimson v3 protocol☆11Updated 10 years ago
- 🍯 A basic Python based printer honeypot☆9Updated 6 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆34Updated 4 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆21Updated 2 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- module for certexfil☆15Updated 2 years ago
- An HTTP Response fuzzer to find Vulnerabilities in Security Scanners☆26Updated 9 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago