sfl0r3nz05 / OT-NWbasedOnGNS3View external linksLinks
Project created to practice SDN-based Attack & Defence on Modbus/TCP and HTTP protocols in an ICS network.
☆20Jun 10, 2023Updated 2 years ago
Alternatives and similar repositories for OT-NWbasedOnGNS3
Users that are interested in OT-NWbasedOnGNS3 are comparing it to the libraries listed below
Sorting:
- ICSs virtualized lab for cybersecurity testing☆25Jun 28, 2023Updated 2 years ago
- This is a boilerplate which has dependencies for pyspark(3.3.0) mongo(>4.x) connectivity☆10May 3, 2024Updated last year
- ☆10Jul 22, 2022Updated 3 years ago
- ☆11Oct 13, 2025Updated 4 months ago
- This is a template to create a responisive and mobile friendly website based on flask and python. Please like, fork and improve it on you…☆11Aug 21, 2022Updated 3 years ago
- Control de rele por protocolo HTTP Rest☆10Dec 8, 2021Updated 4 years ago
- Base Kafka Producer, consumer, flask api and PySpark Structured streaming Job☆11Oct 20, 2021Updated 4 years ago
- My mpv.net configuration files☆12Jul 10, 2022Updated 3 years ago
- A simple yet feature rich mqtt benchmarking tool in nodejs javascript☆12Aug 15, 2017Updated 8 years ago
- Signal Processing for Dummies☆11Mar 13, 2020Updated 5 years ago
- Prototype of the HealthOS ventilation system☆14Mar 27, 2020Updated 5 years ago
- 工业控制系统中实时篡改TE传感器与PLC可编程逻辑控制之间的Modbus/TCP通信数据☆13Jun 17, 2019Updated 6 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 8 months ago
- ☆11Sep 11, 2024Updated last year
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- ☆10Oct 17, 2020Updated 5 years ago
- ☆13Sep 21, 2021Updated 4 years ago
- GNURadio For Raspberry Pi On Archlinuxarm☆18Apr 29, 2013Updated 12 years ago
- AutoML 2024: HPOD: Hyperparameter Optimization for Unsupervised Outlier Detection☆12Jul 12, 2024Updated last year
- This is the Network Flow Generator for ICSSIM☆16Aug 28, 2025Updated 5 months ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- ☆14Dec 22, 2015Updated 10 years ago
- An attempt at replicating Deepmind's Neural Turing Machines in Theano☆11Nov 27, 2016Updated 9 years ago
- This repository contains demo code of basic digital twin system☆15Nov 4, 2020Updated 5 years ago
- automagically fixes simple flake8 lints☆15Jun 26, 2024Updated last year
- Creates a K3s cluster using Ansible on Raspberry Pi☆12Aug 24, 2021Updated 4 years ago
- sysadmin☆12Dec 2, 2020Updated 5 years ago
- ☆11Mar 14, 2023Updated 2 years ago
- Learning from Graphs: From Mathematical Principles to Practical Tools☆11Apr 16, 2021Updated 4 years ago
- hackasat-qualifier-2023-techpapers☆11Jul 17, 2023Updated 2 years ago
- Tools demonstrated at DEF CON 26 talk "Hacking PLCs and Causing Havoc on Critical Infrastructures"☆48Aug 10, 2018Updated 7 years ago
- Ejemplos del curso Docker sencillo para programadores☆11Sep 2, 2017Updated 8 years ago
- A demo docker image for common privilege escalation techniques in *nix systems☆10Oct 5, 2025Updated 4 months ago
- Provides docker-compose template for Kafka monitoring with Splunk☆14May 15, 2023Updated 2 years ago
- TESPy model of a refrigeration machine☆14Jul 30, 2025Updated 6 months ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Implementation of QFuzz.☆17Dec 3, 2021Updated 4 years ago
- ☆18Nov 27, 2017Updated 8 years ago
- Tigera presentation archive☆14Oct 7, 2025Updated 4 months ago