scy-phy / OPC-UA-attacks-POCView external linksLinks
Artifact for the paper Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems at CPSIoTSec 2022 and BlackHat Europe 2021
☆13Nov 17, 2022Updated 3 years ago
Alternatives and similar repositories for OPC-UA-attacks-POC
Users that are interested in OPC-UA-attacks-POC are comparing it to the libraries listed below
Sorting:
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- A repository dedicated to the activity of the CWE-CAPEC ICS/OT Special Interest Group.☆59Oct 17, 2023Updated 2 years ago
- Unpacker for Siemens S7 1200 PLC firmware☆25Jan 14, 2022Updated 4 years ago
- A python to Siemens WinCC interface.☆33Sep 13, 2017Updated 8 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆41Oct 27, 2023Updated 2 years ago
- Metasploit Modules for OPC UA☆35Apr 2, 2020Updated 5 years ago
- python framework to parse logs for IR☆15May 2, 2021Updated 4 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432)☆10Mar 24, 2023Updated 2 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Apr 24, 2023Updated 2 years ago
- 该工具基于国家JT/T808部标协议开发用来模拟客户端(设备),采用了electron+vue+element-ui相关技术☆13May 6, 2023Updated 2 years ago
- 工控态势感知工具 Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks…☆10Sep 10, 2017Updated 8 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- 一个简单的php危险函数检测工具☆10Dec 19, 2018Updated 7 years ago
- GitHub Repository for the HW CWE SIG☆16Jan 21, 2026Updated 3 weeks ago
- IRB Drawing Interface☆12Dec 11, 2019Updated 6 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- ReverseIP-CN 是一款专为中文网络环境优化的IP反查域名工具,能够快速查询指定IP/域名关联的所有网站,增加输入清洗优化查询速率。`ReverseIP` `IP反查` `网络安全工具` `红队工具` `资产测绘` `中文网络` `国内API` `企业安全` `威胁…☆20Jan 15, 2026Updated last month
- 交通运输行业标准JT\T808☆12Dec 8, 2017Updated 8 years ago
- CVE-2019-2725 bypass pocscan and exp☆11Jun 21, 2019Updated 6 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- Sample Industry 4.0 Asset Administration Shell API for Azure Digital Twins☆21Mar 13, 2023Updated 2 years ago
- ☆15Nov 29, 2017Updated 8 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- Industrial datasets - datasets for evaluating industrial intrusion detection systems on IPAL.☆52Jan 22, 2026Updated 3 weeks ago
- 一款实现资产测绘、信息收集、隐私提取、编码转换等功能的chrome插件,部分还没来得及实现。☆14Apr 19, 2023Updated 2 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Jul 23, 2015Updated 10 years ago
- Malmod☆14Jan 19, 2020Updated 6 years ago
- Tools to interact with Siemens PLCs☆13Aug 23, 2023Updated 2 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- 流行的python书籍☆13Sep 28, 2018Updated 7 years ago
- Introduction to Machine Learning with Time Series workshop☆14Nov 3, 2023Updated 2 years ago
- Modbus TCP vulnerability demonstration☆15Jan 22, 2020Updated 6 years ago
- HECTOR☆20Mar 3, 2017Updated 8 years ago
- 基于Python3的Web日志分析小工具☆12Nov 10, 2016Updated 9 years ago
- ☆15Nov 16, 2025Updated 3 months ago
- 🔐Introduction to lattice-based attacks in cryptanalysis☆14May 6, 2024Updated last year