For OT / SCADA / SOC teams

Industrial systems you can break safely.

Physics-honest SCADA telemetry, Docker-delivered Virtual PLCs, and ground-truth labelled ICS attack datasets — all under the same cryptographically-sealed evidence chain as our synthetic-data products.

Plant templates
67
MITRE ICS techniques
67
OT protocols
6
Outbound
0 calls
vplc / clarifier-2 · Modbus 502 · OPC-UA 4840live · 2 ms cycle
process trend · last 5 min3 tags
FT-101PT-204TT-309
FT-101 flow
342.7L/min
PT-204 pressure
5.42bar
TT-309 temp
62.1°C
LT-412 level
78.4%
AT-518 pH
6.92
MT-621 motor speed
1462rpm
MT-621 over-speed alarm · ack pending
cycle 482 911

Three products. One physics engine. One evidence chain.

Telemetry, simulator, and attack data all share the same sealed-contract pipeline, so a Virtual SCADA run can be replayed inside an air-gapped Virtual PLC and labelled by the ICS Security engine — without leaving the platform.

Plant templates we ship out of the box.

Each template bundles calibrated response models for every analog loop plus event-driven state machines with safety interlocks for every discrete state, mapped to a real protocol surface.

Water & Wastewater

Pump / clarifier / blower / aerator templates with realistic chemistry.

Power & Grid

Substation, breakers, RTU telemetry, SCADA/EMS integration patterns.

Manufacturing

Conveyor, stamping, robotic-cell templates with discrete-event behaviour.

Oil & Gas Midstream

Pipeline, compressor, custody-transfer skids with regulator-grade dynamics.

Building / HVAC

BACnet AHU, VAV, chiller plant; occupancy and outside-air-driven cycles.

Custom plant

Bring your P&ID — we calibrate a response model per loop and ship the pack.

Cyber-range chain

SCADA + ICS, end-to-end, in one bundle.

Step 1

Live SCADA telemetry

A realistic disturbance schedule drives process dynamics in real time.

Step 2

Attack injection

Inject command-injection, replay, MITM events on real protocol traffic.

Step 3

IDS / SOC capture

pcapng captures the wire; parquet captures the process; truth.ndjson labels both.

Step 4

Sealed evidence

BLAKE3-chained .tar.zst — verifiable offline by your SOC platform owner.

Posture that satisfies OT security review.

Per-deployment key

Evidence chain signed locally; no licence-server phone-home.

Real protocols

5 SCADA protocols (Modbus, OPC-UA, BACnet, MQTT, DNP3); VPLC adds IEC 61850.

Physics honest

Per-tag calibrated response model; event-driven state machines with safety interlocks for discrete state.

Single Docker image

~280 MB distroless, signed with cosign, offline registry supported.

Bring your P&ID. We’ll ship a sealed cyber-range bundle.

45-minute working session: you describe a plant and one or two adversary behaviours, we generate the SCADA run and the labelled attack mix, and you keep the BLAKE3-sealed bundle to load into your IDS/SOC pipeline.

vplc / clarifier-2 · Modbus 502 · OPC-UA 4840live · 2 ms cycle
process trend · last 5 min3 tags
FT-101PT-204TT-309
FT-101 flow
342.7L/min
PT-204 pressure
5.42bar
TT-309 temp
62.1°C
LT-412 level
78.4%
AT-518 pH
6.92
MT-621 motor speed
1462rpm
MT-621 over-speed alarm · ack pending
cycle 482 911