Industrial systems you can break safely.
Physics-honest SCADA telemetry, Docker-delivered Virtual PLCs, and ground-truth labelled ICS attack datasets — all under the same cryptographically-sealed evidence chain as our synthetic-data products.
- Plant templates
- 67
- MITRE ICS techniques
- 67
- OT protocols
- 6
- Outbound
- 0 calls
Three products. One physics engine. One evidence chain.
Telemetry, simulator, and attack data all share the same sealed-contract pipeline, so a Virtual SCADA run can be replayed inside an air-gapped Virtual PLC and labelled by the ICS Security engine — without leaving the platform.
Plant templates we ship out of the box.
Each template bundles calibrated response models for every analog loop plus event-driven state machines with safety interlocks for every discrete state, mapped to a real protocol surface.
Water & Wastewater
Pump / clarifier / blower / aerator templates with realistic chemistry.
Power & Grid
Substation, breakers, RTU telemetry, SCADA/EMS integration patterns.
Manufacturing
Conveyor, stamping, robotic-cell templates with discrete-event behaviour.
Oil & Gas Midstream
Pipeline, compressor, custody-transfer skids with regulator-grade dynamics.
Building / HVAC
BACnet AHU, VAV, chiller plant; occupancy and outside-air-driven cycles.
Custom plant
Bring your P&ID — we calibrate a response model per loop and ship the pack.
SCADA + ICS, end-to-end, in one bundle.
Live SCADA telemetry
A realistic disturbance schedule drives process dynamics in real time.
Attack injection
Inject command-injection, replay, MITM events on real protocol traffic.
IDS / SOC capture
pcapng captures the wire; parquet captures the process; truth.ndjson labels both.
Sealed evidence
BLAKE3-chained .tar.zst — verifiable offline by your SOC platform owner.
Posture that satisfies OT security review.
Per-deployment key
Evidence chain signed locally; no licence-server phone-home.
Real protocols
5 SCADA protocols (Modbus, OPC-UA, BACnet, MQTT, DNP3); VPLC adds IEC 61850.
Physics honest
Per-tag calibrated response model; event-driven state machines with safety interlocks for discrete state.
Single Docker image
~280 MB distroless, signed with cosign, offline registry supported.
Bring your P&ID. We’ll ship a sealed cyber-range bundle.
45-minute working session: you describe a plant and one or two adversary behaviours, we generate the SCADA run and the labelled attack mix, and you keep the BLAKE3-sealed bundle to load into your IDS/SOC pipeline.