Unnoticed by most people, Industrial Control Systems (ICSs) control entire productions and critical infrastructures such as water distribution, smart grid and automotive manufacturing. Due to the ongoing digitalization, these systems are becoming more and more connected in order to enable remote control and monitoring. However, this shift bears significant risks, namely a larger attack surface, which can be exploited by attackers. In order to make these systems more secure, it takes research, which is, however, difficult to conduct.
FEATURES
SIMILAR TOOLS
A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.
A data-mining and deep web asset search engine for breach analysis and prevention services.
Web-based tool for browsing mobile applications sandbox and previewing SQLite databases.
iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.
Android vulnerability analysis system with efficient scanning and high accuracy.
Phish Report is inaccessible without JavaScript and cookies enabled.
An Active Defense framework for detecting and responding to phishing attacks in Office 365 Message Trace logs.
A tool for quantitative risk analysis of Android applications using machine learning techniques.
A tool for analyzing Android applications in local storage with various functionalities.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.