random scripts for random things
☆13Mar 11, 2025Updated 11 months ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below
Sorting:
- SCADA network attack datasets and process logs☆20May 2, 2017Updated 8 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- SPL to lucene translator☆15Jan 24, 2015Updated 11 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 8 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- Modbus stager in assembly and some scripts to upload/download data to the holding register of a PLC☆44Jun 10, 2020Updated 5 years ago
- Source code for Modbus/TCP fuzzer used for ETFA 2015 paper☆21Feb 6, 2025Updated last year
- Purposely Vulnerable Embedded Device☆22Jun 19, 2017Updated 8 years ago
- GasPot Released at Blackhat 2015☆145Apr 30, 2024Updated last year
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Common Industrial Protocol based device scanner over the internet☆24Mar 10, 2016Updated 9 years ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Nov 17, 2015Updated 10 years ago
- Discovering all CIP communicating devices on a network☆11Dec 18, 2024Updated last year
- This is a list of Computer and Network Security Axioms☆30May 1, 2020Updated 5 years ago
- Masters of IT project, network attacks against Profinet SCADA systems.☆31Sep 15, 2016Updated 9 years ago
- REST API (CRUD) with Express implemented with Typescript. Using MYSQL Data Base connector and Data Access Object as Design Pattern at Dat…☆11Jun 14, 2018Updated 7 years ago
- ☆11Sep 23, 2025Updated 5 months ago
- Python 3 server used to control SK8RAT implant☆36Jan 5, 2021Updated 5 years ago
- Locates Honeywell/Tridium/Niagara HVAC JACEs/Controllers via HTTP fingerprints/strings. Very handy for vulnerability/pentesting.☆43Jan 9, 2017Updated 9 years ago
- Windows System Treasure☆76Jun 10, 2017Updated 8 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆150Oct 2, 2020Updated 5 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- Example of using Express & Node.js with HTTPS.☆10Feb 17, 2018Updated 8 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆110Mar 14, 2018Updated 7 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- An implementation of crypto.Signer and crypto.Decrypter for private keys resident on a TPM 2.0 device☆11Aug 6, 2025Updated 6 months ago
- An app which reads data from a serial port and serves it on a TCP port.☆11Oct 7, 2023Updated 2 years ago
- Siemens Simatic S7 Metasploit Modules☆40Jul 14, 2012Updated 13 years ago
- A simple way for detection the remote user's antivirus☆84Oct 24, 2016Updated 9 years ago
- distributed nmap using Celery☆11Mar 17, 2017Updated 8 years ago