References and resources

Tools, documentation, and lab material to support research and hands-on analysis in the context of Anvil. This page prioritises practical investigation of OT/ICS devices, protocols, and environments over abstract compliance or vendor marketing.

Binary and firmware analysis

Tools for dissecting executables, firmware images, protocol handlers, and embedded artefacts. These are foundational and reused across all later stages.

  • Ghidra: full reverse-engineering suite with decompiler

  • radare2: low-level reverse engineering and analysis framework

  • Cutter: graphical frontend for radare2

  • ImHex: hex editor with pattern language for binary formats

  • binspector: binary structure and filesystem inspection

Industrial protocol specifications and references

Authoritative protocol documentation used to understand wire formats, state machines, and implementation assumptions.

Cross-protocol tool collections

Curated collections of tools, scripts, PCAPs, and research material spanning multiple protocols and vendors. These are useful as starting points and comparison baselines.

Protocol-specific tooling

Libraries, scanners, and test tools focused on individual OT/ICS protocols. Useful for both benign experimentation and hostile interaction.

Modbus

Siemens S7

OPC UA

IEC 60870-5-104

DNP3

MQTT

Sandboxes, simulators, and testbeds

Controlled environments for experimentation without touching real infrastructure. These support protocol interaction, fault injection, and attack simulation.

Operational labs, honeypots, and deception

Tools that model or expose realistic industrial services, often used to observe attacker behaviour or test detection logic.

Traffic captures and empirical data

Realistic protocol traffic is essential for understanding baseline behaviour and deviations.

Analysis, context, and comparative reading

Background material that connects protocols, implementations, and real-world usage patterns.