• Home
  • Categories
  • Pricing
  • Submit
    Built with
    Ever Works
    Ever Works

    Connect with us

    Stay Updated

    Get the latest updates and exclusive content delivered to your inbox.

    Product

    • Categories
    • Pricing
    • Help

    Clients

    • Sign In
    • Register
    • Forgot password?

    Company

    • About Us
    • Admin
    • Sitemap

    Resources

    • Blog
    • Submit
    • API Documentation
    All product names, logos, and brands are the property of their respective owners. All company, product, and service names used in this repository, related repositories, and associated websites are for identification purposes only. The use of these names, logos, and brands does not imply endorsement, affiliation, or sponsorship. This directory may include content generated by artificial intelligence.
    Copyright © 2025 Ever. All rights reserved.·Terms of Service·Privacy Policy·Cookies
    Decorative pattern
    Decorative pattern
    1. Home
    2. Security
    3. Awesome Industrial Protocols

    Awesome Industrial Protocols

    Security-oriented list of resources about industrial network protocols used in SCADA, ICS, and OT environments, including protocol specifications, security tools, and research papers.

    Surveys

    Loading more......

    Information

    Websitegithub.com
    PublishedMar 20, 2026

    Categories

    1 Item
    Security

    Tags

    3 Items
    #ics#scada#protocols

    Similar Products

    6 result(s)

    Awesome Network Protocol Fuzzing

    A list of curated papers and tools focusing on network protocol fuzzing for discovering vulnerabilities, testing implementations, and improving protocol security.

    Awesome Networking

    A collection of awesome networking courses, books, tutorials and other resources for learning computer networking, protocols, and network programming.

    Awesome IoT

    Awesome IoT list covering frameworks, libraries, operating systems, and platforms for Internet of Things development including EdgeX Foundry, FogAtlas, and various IoT protocols.

    Awesome CloudSec Labs

    Awesome free cloud native security learning labs including CTF challenges, self-hosted workshops, guided vulnerability labs, and cloud security research environments.

    Awesome Homomorphic Encryption

    A curated list of libraries, software, papers, and resources for Homomorphic Encryption (HE), enabling computation on encrypted data without decryption for privacy-preserving applications.

    Awesome Cloud Security

    Awesome curated list of cloud security resources including penetration testing tools for Cloud Security, mainly covering AWS, Azure, and Google Cloud Platform security assessment and hardening.

    Overview

    A security-oriented compilation of resources about industrial network protocols. Covers protocols used in SCADA (Supervisory Control and Data Acquisition), ICS (Industrial Control Systems), and OT (Operational Technology) environments.

    Industrial Protocols

    Energy Sector

    • Modbus - Serial communication protocol for PLCs
    • DNP3 - Distributed Network Protocol for SCADA
    • IEC 60870-5-104 - Telecontrol protocol for power systems
    • IEC 61850 - Substation automation standard

    Manufacturing

    • OPC UA - Open Platform Communications Unified Architecture
    • EtherNet/IP - Industrial Ethernet protocol
    • PROFINET - Real-time industrial Ethernet
    • Modbus TCP - Modbus over TCP/IP

    Building Automation

    • BACnet - Building automation and control networks
    • KNX - Home and building automation
    • LonWorks - Control network protocol

    Transportation

    • CAN Bus - Controller Area Network
    • Ethernet POWERLINK - Real-time Ethernet
    • SERCOS - Serial real-time communication system

    Security Tools

    Protocol Analyzers

    • Wireshark - with industrial protocol dissectors
    • Nmap - with NSE scripts for ICS
    • Scapy - Packet manipulation for protocol testing

    Security Assessment

    • ISF - Industrial Security Framework
    • PLCScan - PLC fingerprinting tool
    • Modbus penetration testing tools

    Monitoring and Detection

    • Zeek (Bro) - Network security monitoring
    • Suricata - IDS/IPS with industrial protocol support
    • GRASSMARLIN - Passive ICS network mapper

    Security Considerations

    • Legacy protocol vulnerabilities
    • Lack of authentication in many protocols
    • Cleartext transmission of commands
    • Protocol fuzzing and exploit development
    • Network segmentation importance

    Research Areas

    • Protocol reverse engineering
    • Vulnerability discovery
    • Attack surface analysis
    • Secure protocol design
    • Intrusion detection for ICS

    Pricing

    Free and open-source security research resources.