ICSs virtualized lab for cybersecurity testing
☆27Jun 28, 2023Updated 2 years ago
Alternatives and similar repositories for ICSsVirtualForCiberSec
Users that are interested in ICSsVirtualForCiberSec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Project created to practice SDN-based Attack & Defence on Modbus/TCP and HTTP protocols in an ICS network.☆22Jun 10, 2023Updated 2 years ago
- List of tools and references used by NU Cybersecurity students,☆15Feb 12, 2024Updated 2 years ago
- Tools demonstrated at DEF CON 26 talk "Hacking PLCs and Causing Havoc on Critical Infrastructures"☆50Aug 10, 2018Updated 7 years ago
- Dockerization of CICFlowMeter, with an entry point to accept command line parameters when running the container.☆14May 8, 2020Updated 5 years ago
- A demonstration of domain generation algorithm (DGA) and determing regular expression and yara rule for each dga.☆16Sep 4, 2024Updated last year
- BusPwn V1.0 is a powerful Modbus hacking framework designed for testing and exploiting vulnerabilities in Modbus-based systems commonly f…☆27Apr 19, 2025Updated 11 months ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆14Sep 10, 2024Updated last year
- ☆20May 28, 2024Updated last year
- Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)☆598Oct 29, 2025Updated 4 months ago
- 💻 Learn Bash Shell Scripting by doing Exercises for Programmers☆24Jun 6, 2024Updated last year
- The Doom Superior Add On☆16Aug 4, 2019Updated 6 years ago
- Beer-ISAC Community Resources☆26Jan 22, 2021Updated 5 years ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆39Apr 27, 2025Updated 10 months ago
- ☆10Oct 9, 2024Updated last year
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- ☆13Apr 27, 2020Updated 5 years ago
- ☆19Jun 3, 2021Updated 4 years ago
- A simple CLI command that initialises a Kedro project from an existing Python package☆11Aug 23, 2024Updated last year
- Command generator for pentesting tools☆17Dec 2, 2024Updated last year
- ☆27Mar 16, 2025Updated last year
- PWN Challenge☆11Apr 28, 2022Updated 3 years ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- AutoML 2024: HPOD: Hyperparameter Optimization for Unsupervised Outlier Detection☆13Jul 12, 2024Updated last year
- ☆14Sep 18, 2025Updated 6 months ago
- Industrial Security Scripts☆146Mar 1, 2026Updated 3 weeks ago
- Workshop dictado para Chicas Programando - Noviembre 2019☆10Nov 24, 2019Updated 6 years ago
- Prototype of the HealthOS ventilation system☆14Mar 27, 2020Updated 5 years ago
- Source code for DABANGG attack.☆10Mar 26, 2022Updated 3 years ago
- ICSGoat: A Damn Vulnerable ICS Infrastructure☆32Aug 26, 2024Updated last year
- OSINT Intelligence for different areas ( useful for different type of investigations and learning etc)☆37May 20, 2020Updated 5 years ago
- OP-TEE Trusted Applications vulnerable to memory corruption bugs.☆16Jul 3, 2020Updated 5 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 4 months ago
- 🧠 Using large language models to classify dark net documents in a zero-shot learning enviornments.☆21Apr 1, 2022Updated 3 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- sysadmin☆12Dec 2, 2020Updated 5 years ago
- ☆10Jul 22, 2022Updated 3 years ago
- Developing for Kubernetes with k3s+GitLab☆10Oct 25, 2021Updated 4 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Understanding industrial Cybersecurity.☆52Updated this week