usnistgov / ucefLinks
Universal CPS Environment for Federation
☆19Updated 3 years ago
Alternatives and similar repositories for ucef
Users that are interested in ucef are comparing it to the libraries listed below
Sorting:
- ☆14Updated 5 years ago
- A dataset of software supply chain compromises. Please help us maintain it!☆129Updated 3 years ago
- Material from ICS Village talk at DEFCON 25☆12Updated 7 years ago
- IEC104 Client for Metasploit☆11Updated 7 years ago
- Damn Vulnerable Chemical Process - Vinyl Acetate Monomer☆22Updated 10 years ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Updated 4 years ago
- Damn Vulnerable Chemical Process - Tennessee Eastman☆79Updated 10 years ago
- ☆52Updated 8 years ago
- Scan pypi for typosquatting☆38Updated 2 years ago
- ☆16Updated 7 years ago
- ☆30Updated 3 months ago
- Protocol Inspection and State Machine Analysis☆23Updated 7 years ago
- Public Code for ICS Evasion Attack Generation☆44Updated 4 years ago
- NCC Group Template for the Microsoft Threat Modeling Tool 2016 for Automotive Security☆48Updated 5 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- Python / Scapy tool to analyze and interact with IEC 61850 Goose traffic☆37Updated 4 years ago
- ☆27Updated 2 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 10 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 5 years ago
- DNP3 Cyber-attack datasets☆14Updated 8 years ago
- ICS TestBed Framework☆69Updated 7 years ago
- A vulnerability assessment tool for system models☆13Updated 4 years ago
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆42Updated 9 months ago
- Automatically exported from code.google.com/p/rough-auditing-tool-for-security☆88Updated 4 years ago
- CANBus protection used to isolate third party systems requiring OBDII access.☆19Updated 10 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆32Updated 9 years ago
- 2020 Machine Learning Security Evasion Competition☆49Updated 5 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆79Updated this week
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Updated 9 years ago
- Network and USB protocol fuzzing toolkit.