For many industrial control system devices, there is not a simple solution for programmatically accessing memory. Without an API, an incident responder or digital forensics analyst may be required to manually probe memory looking for anomalies or malicious activity. This project is intended to develop APIs that allow an analyst to adapt pre-existing tools or rapidly build new tools in order to target these devices. Current Devices: GE D20MX Future Work: JTAG Interface
Common questions about ics_mem_collect including features, pricing, alternatives, and user reviews.
ics_mem_collect is Developing APIs to access memory on industrial control system devices. It is a OT Security solution designed to help security teams with Memory Forensics.
ics_mem_collect is a free OT Security tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/fireeye/ics_mem_collect/ for download and installation instructions.
Popular alternatives to ics_mem_collect include:
Compare all ics_mem_collect alternatives at https://cybersectools.com/alternatives/icsmemcollect
ics_mem_collect is for security teams and organizations that need Memory Forensics. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other OT Security tools can be found at https://cybersectools.com/categories/ot-security
Head-to-head feature, pricing, and rating breakdowns.
AI platform for autonomous operations mgmt in industrial & supply chain envs
OT/IoT/IT asset discovery & threat detection platform for cyber-physical systems