sondt99 / AI-based-ICS-Incident-Investigation-SystemView external linksLinks
This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromised devices to safeguard critical infrastructure.
☆14Mar 21, 2025Updated 10 months ago
Alternatives and similar repositories for AI-based-ICS-Incident-Investigation-System
Users that are interested in AI-based-ICS-Incident-Investigation-System are comparing it to the libraries listed below
Sorting:
- A simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.☆18Jun 29, 2025Updated 7 months ago
- Awesome Blog Template For Tech-er☆13Jan 28, 2026Updated 2 weeks ago
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆19Apr 25, 2025Updated 9 months ago
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆32Nov 30, 2025Updated 2 months ago
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Oct 28, 2024Updated last year
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆18Mar 12, 2024Updated last year
- National Graduation Exam Score from 2022 to 2024☆11Jul 17, 2024Updated last year
- Things help you get started with Java Vulnerability☆75Feb 26, 2023Updated 2 years ago
- A web application dedicated to write sysmon configuration file☆13Oct 23, 2025Updated 3 months ago
- Bài tập lớn IT3180 - Nhập môn Công nghệ phần mềm - Chủ đề Quản lý thu phí đóng góp của Tổ dân phố☆12Jan 12, 2024Updated 2 years ago
- School Project for Course "System Programming"☆15Jan 16, 2022Updated 4 years ago
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- ☆10Sep 24, 2023Updated 2 years ago
- 999% powerfull ast obf by ngocuyencoder☆15May 19, 2025Updated 8 months ago
- Pentest Q&A trick written in Vietnamese☆11May 16, 2019Updated 6 years ago
- Qiling Framework Documentation☆18Mar 9, 2025Updated 11 months ago
- Qiling Advanced Binary Emulation framework☆12Aug 22, 2019Updated 6 years ago
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 5 months ago
- A malware scanner with Yara and ClamAV binding☆12Apr 16, 2025Updated 9 months ago
- A tool for injecting custom JavaScript payloads into PDF files for penetration testing and XSS proof-of-concept generation.☆18Jan 10, 2025Updated last year
- This repository provides a dockerized infrastructure and a python implementation of the CVE-2019-11043 exploit.☆14May 25, 2020Updated 5 years ago
- ☆35Oct 6, 2025Updated 4 months ago
- Template for graduate thesis, especially in FPT University☆19Nov 21, 2024Updated last year
- AD related packs are here!☆14Feb 16, 2023Updated 2 years ago
- This repository is an interactive collection of my solutions to various XSS challenges.☆13Oct 25, 2020Updated 5 years ago
- CCP implementation of the BBR congestion control algorithm☆20Oct 9, 2025Updated 4 months ago
- ☆19May 19, 2024Updated last year
- ☆22May 7, 2024Updated last year
- ☆22Dec 21, 2021Updated 4 years ago
- ☆25Mar 11, 2025Updated 11 months ago
- Fork repository for CryptoCat's "Binary Exploitation 101 Course" AKA "Practical Buffer Overflow Exploitation"☆22Dec 9, 2022Updated 3 years ago
- Offical Writeups for n00bzCTF2023☆22Jun 15, 2023Updated 2 years ago
- Towards Universal Internet Congestion Control Benchmarking ...☆23Aug 11, 2023Updated 2 years ago
- ☆23Oct 30, 2025Updated 3 months ago
- IDA Type Info Libraries for RE☆32Jan 11, 2025Updated last year
- Attack SQL Server through gopher protocol☆21Nov 22, 2021Updated 4 years ago
- TCP1P CTF 2024 Challenges Repo☆27Oct 15, 2024Updated last year
- Slides/Demos from the BSides Munich 2019 talk "Attacking Java RMI in 2019"☆101Sep 20, 2019Updated 6 years ago
- Bounty Boys: OWASP Top 10 Series☆29Nov 19, 2024Updated last year