43 skills found · Page 1 of 2
shekyan / SlowhttptestApplication Layer DoS attack simulator
step-security / Github Actions GoatGitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment
Jjschwartz / NetworkAttackSimulatorAn environment for testing AI pentesting agents against a simulated network.
ChainXim-Team / ChainXimChainXim is a blockchain simulator developed by XinLab, which is used to simulate and verify blockchains under different networks and different consensus protocols, and can be designed to assist network attackers in evaluating the security performance of the blockchain.
skavngr / NetbotA versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.
polarking / Jss7 Attack SimulatorSS7 Attack Simulator based on RestComm's jss7
jevinskie / EmuscaPower trace simulator using Unicorn Engine for side channel analysis attack testing
LiuYuancheng / Railway Control OT Cyber AttackWe want to build a city simulator OT(Operational Technology) system with two railways and create two kinds of HMI software (Engineer monitoring HMI and the Lecturer training HMI) to control the system. We also want to use this system to demo different kinds of PLC OT-Cyber attack by implementing the related attack simulation function.
Keysight / FiSimAn open-source deterministic fault attack simulator prototype
machanic / SimulatorAttackThe official implementation of CVPR 2021 paper "Simulating Unknown Target Models for Query-Efficient Black-box Attacks"
LiuYuancheng / Py PLC Honey PotWe want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. The system will integrate essential components: PLC emulator, OT controller simulator, ladder logic verifier, data logger, attack detector and system monitor.
deptofdefense / Satellite Jamming SimulatorA simple simulator for modeling earth-to-space RFI attacks. Demonstrated at DEFCON 30.
jamescl604 / MSFSVoiceAttackPluginEnables additional control of Microsoft Flight Simulator 2020 from Voice Attack
xosofox / IPASIngress Portal Attack Simulator
quic / VaspVASP is a framework to simulate attacks on V2X networks. It works on top of the VEINS simulator.
dimanzt / Game Theoretic Network SimulatorGTNS is a discrete-event network simulator targeted primarily for research and educational use. GTNS is written in Visual C++ programming language and supports different network topologies. This simulator was first produced to implement locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs. LMAR can find an ad-hoc path without selfish nodes and wormholes using an exhaustive search algorithm in polynomial time. Also when the primary path fails, it discovers an alternative safe path if network graph remains connected after eliminating selfish/malicious nodes. The key feature of LMAR to seek safe route free of selfish and malicious nodes in polynomial time is its searching algorithm and flooding stage that its generated traffic is equi-loaded compared to single-path routing protocols but its security efficiency to bypass the attacks is much better than the other multi-path routing protocols. LMAR concept is introduced to provide the security feature known as availability and a simulator has been developed to analyze its behavior in complex network environments [1]. Then we have added detection mechanism to the simulator, which can detect selfish nodes in network. The proposed algorithm is resilient against collision and can be used in networks which wireless nodes use directional antennas and it also defend against an attack that malicious nodes try to break communications by relaying the packets in a specific direction. Some game theoretic strategies to enforce cooperation in network have been implemented in GTNS, for example Forwarding-Ratio Strategy, TFT-Strategy and ERTFT. This tutorial helps new users to get familiar with GTNS and run different network scenarios.
SagarBiswas-MultiHAT / BruteforceLab2BruteforceLab2 is a self-contained, hands-on web security lab that demonstrates credential brute-force attacks and basic defenses. It includes a Flask login app, a CLI attacker simulator, optional in-memory rate limiting and lockout, automated tests and CI, and configuration knobs (rate window/max, enforce regex). Run locally to observe attacks, to
bcasim / BcasimBlockchain Attack Simulator (BCASim) is an Open Source Blockchain Simulator for Attack Analysis
TrafficSliver / Splitting SimulatorSimulator to apply splitting strategies as defense for WFP attacks
pwwl / Tep Attack SimulatorICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: "Attributions for ML-based ICS anomaly detection: From theory to practice"