Artifact for the paper Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems at CPSIoTSec 2022 and BlackHat Europe 2021
☆13Nov 17, 2022Updated 3 years ago
Alternatives and similar repositories for OPC-UA-attacks-POC
Users that are interested in OPC-UA-attacks-POC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- Malmod☆15Jan 19, 2020Updated 6 years ago
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆63Mar 4, 2026Updated last month
- python framework to parse logs for IR☆15May 2, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆35Apr 16, 2021Updated 5 years ago
- GitHub Repository for the HW CWE SIG☆16Updated this week
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆53Jan 22, 2026Updated 3 months ago
- ☆10Feb 2, 2021Updated 5 years ago
- We want to create a dynamic monitoring and evaluation tool aims to check and test the resistance level or resilience of communication bet…☆14Mar 30, 2026Updated last month
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆13Mar 20, 2026Updated last month
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- A prototype of rule generator for process-aware monitoring system implementing IEC-60870-5-104 protocol and Bro monitoring tool.☆14May 27, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432)☆10Mar 24, 2023Updated 3 years ago
- A python to Siemens WinCC interface.☆34Sep 13, 2017Updated 8 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆34Feb 12, 2026Updated 2 months ago
- 🚀 MariaDB is a community-developed, commercially supported relational database management system. This repo provides you with an introdu…☆11Apr 1, 2025Updated last year
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- ueditor文本编辑器文件上传漏洞,exp,可getshell☆16Apr 14, 2023Updated 3 years ago
- ☆18Aug 13, 2020Updated 5 years ago
- 一个简单的php危险函数检测工具☆10Dec 19, 2018Updated 7 years ago
- Metasploit Modules for OPC UA☆34Apr 2, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A glibc overlay library for process self-virtualization☆15Nov 25, 2025Updated 5 months ago
- Web application for MEC011 API testing.☆12Jul 24, 2020Updated 5 years ago
- ☆17Apr 13, 2026Updated 2 weeks ago
- Powershell script for Windows to retrieve the authentication hardening status of DCOM applications☆23Jan 15, 2023Updated 3 years ago
- Focus on ICS, providing the latest ICS consulting, research, services(专注工控网络安全,提供最新的工控网络安全咨询、研究、服务)☆19Mar 17, 2018Updated 8 years ago
- ☆10Jan 14, 2022Updated 4 years ago
- The Project Ninja is A RTC2 and Trojan-Malware Cyber-Attack Simulation toolkit designed for red team attackers to rapidly and dynamically…☆15Jan 9, 2026Updated 3 months ago
- IRB Drawing Interface☆14Dec 11, 2019Updated 6 years ago
- 🔐Introduction to lattice-based attacks in cryptanalysis☆14May 6, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Rust natural language processing model with a focus on mapping back to source and "layerable" recognizers☆19Jan 3, 2022Updated 4 years ago
- Warehouse management system using RFID and Raspberry Pi for Industry 4.0☆19Jun 28, 2020Updated 5 years ago
- Ansible/Packer/Terraform setup for our Bambi CTF on Hetzner Cloud☆20Sep 10, 2025Updated 7 months ago
- A GTK frontend for VDE and QEMU/KVM. Supports multiple network on the same host, tunneling between hosts networks, a fully featured confi…☆22Nov 7, 2025Updated 5 months ago
- Minimal JS Wi-Fi QR Code Generator☆12Mar 4, 2023Updated 3 years ago
- Tools to make life easier ^_^☆13Aug 21, 2025Updated 8 months ago
- 可以对多个网站进行批量CMS识别,寻找网站指纹,进行漏洞利用☆15Apr 25, 2022Updated 4 years ago