Loading...
Operational technology security tools for protecting industrial control systems, SCADA networks, and critical infrastructure.
Explore 65 curated cybersecurity tools, with 15,426 visitors searching for solutions
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to build security programs
Feature your product and reach thousands of professionals.
Developing APIs to access memory on industrial control system devices.
Developing APIs to access memory on industrial control system devices.
A tool for scanning networks, enumerating Siemens PLCs, and gathering detailed information about them.
A tool for scanning networks, enumerating Siemens PLCs, and gathering detailed information about them.
An exploitation framework for industrial security with modules for controlling PLCs and scanning devices.
An exploitation framework for industrial security with modules for controlling PLCs and scanning devices.
PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.
PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.
Website providing information on Snap7 open-source communication library.
Website providing information on Snap7 open-source communication library.
Ultimate Internet of Things/Industrial Control Systems reconnaissance tool powered by Shodan.
Ultimate Internet of Things/Industrial Control Systems reconnaissance tool powered by Shodan.
A customized Kali Linux distribution for ICS/SCADA pentesting professionals
A customized Kali Linux distribution for ICS/SCADA pentesting professionals
PLC-side fuzzing tool for uncovering vulnerabilities in ICS control applications.
PLC-side fuzzing tool for uncovering vulnerabilities in ICS control applications.
Simple perl script for making Modbus transactions from the command line.
Simple perl script for making Modbus transactions from the command line.
Passively maps and visually displays ICS/SCADA network topology for network security
Passively maps and visually displays ICS/SCADA network topology for network security
An industrial control system testing tool that enables security researchers to enumerate SCADA controllers, read register values, and modify register data across different testing modes.
An industrial control system testing tool that enables security researchers to enumerate SCADA controllers, read register values, and modify register data across different testing modes.
Python exploitation tool for gaining root access to Sixnet RTUs in SCADA networks by exploiting application-level vulnerabilities.
Python exploitation tool for gaining root access to Sixnet RTUs in SCADA networks by exploiting application-level vulnerabilities.
A Digital Bond research project to enumerate ICS applications and devices
A Digital Bond research project to enumerate ICS applications and devices
ICSREF is a modular framework that automates reverse engineering of CODESYS industrial control system binaries to identify functions, library calls, and program structures.
ICSREF is a modular framework that automates reverse engineering of CODESYS industrial control system binaries to identify functions, library calls, and program structures.
Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.
Repository of TRISIS/TRITON/HatMan malware samples and decompiled sources targeting ICS Triconex SIS controllers.
Repository of pcap traces for evaluating Network Intrusion Detection Systems in HVAC systems.
Repository of pcap traces for evaluating Network Intrusion Detection Systems in HVAC systems.
A project providing a low-cost ICS testbed with affordable hardware, instructions, and attacker scenarios to facilitate learning in industrial security.
A project providing a low-cost ICS testbed with affordable hardware, instructions, and attacker scenarios to facilitate learning in industrial security.
Common questions about OT Security tools including selection guides, pricing, and comparisons.
Operational technology security tools for protecting industrial control systems, SCADA networks, and critical infrastructure.
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to build security programs