MODBUS Penetration Testing Framework
☆11Mar 27, 2019Updated 6 years ago
Alternatives and similar repositories for smod
Users that are interested in smod are comparing it to the libraries listed below
Sorting:
- ☆537Feb 19, 2026Updated last week
- Modbus TCP vulnerability demonstration☆15Jan 22, 2020Updated 6 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆17Oct 24, 2020Updated 5 years ago
- ☆30Dec 4, 2021Updated 4 years ago
- Discovering all CIP communicating devices on a network☆11Dec 18, 2024Updated last year
- DeltaV™ Edge Environment provides easy and secure access to DeltaV data for use on premise or in the cloud for monitoring, analytics, rep…☆11Nov 24, 2025Updated 3 months ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- REST API (CRUD) with Express implemented with Typescript. Using MYSQL Data Base connector and Data Access Object as Design Pattern at Dat…☆11Jun 14, 2018Updated 7 years ago
- Firmware for the Macchina M2 to use your car as a sim racing controller☆13Jan 5, 2021Updated 5 years ago
- ☆14May 14, 2022Updated 3 years ago
- FRP Bypass.☆10Oct 29, 2024Updated last year
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆50May 22, 2025Updated 9 months ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- Start making money today - discover lifechanging opportunities and take the first step towards financial independence and freedom!☆14Mar 3, 2025Updated 11 months ago
- This is an open source MDM bypass for ALL MacBooks (M1 M2 M3 M4) ALL and FREE☆12Nov 30, 2024Updated last year
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- An app which reads data from a serial port and serves it on a TCP port.☆11Oct 7, 2023Updated 2 years ago
- Example of using Express & Node.js with HTTPS.☆10Feb 17, 2018Updated 8 years ago
- Elixir -> HTML/JavaScript based presentation framework intended for showing Elixir code☆12Dec 7, 2015Updated 10 years ago
- A public repo to hold some code review challenges for RSA Conference 2022☆11Jun 3, 2022Updated 3 years ago
- Claroty's Public Tools☆39Mar 11, 2020Updated 5 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 7 months ago
- A Python IDA Plugin that finds a route from one function to another.☆12Dec 6, 2018Updated 7 years ago
- We provide the gui for termux . it is a Linux system with gui running on Android for AI programming without root.Ai framework: tensorfl…☆13May 11, 2019Updated 6 years ago
- Get your context value faster☆10Nov 24, 2020Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Brute force your iOS Restrictions Passcode from the key & salt☆15Aug 27, 2019Updated 6 years ago
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year
- Johnny-Five TCP Client for Android devices running Termux☆11Apr 16, 2024Updated last year
- A collection of hacks and one-off scripts☆11Apr 6, 2020Updated 5 years ago
- Training Language Model Agents to Find Vulnerabilities with CTF-Dojo☆33Jan 10, 2026Updated last month
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 6 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- A batch program to crack relatively easy password protected archives (zip/rar).☆12Dec 24, 2023Updated 2 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago