Omar Morando
Hey, I'm Omar! I specialize in offensive security assessment and cutting-edge red teaming services across multiple industries. I've 20+ years of experience in OT/ICS Industrial Automation domain (SCADA, PLC, remote I/O, fieldbus) with expertise in ISA/IEC 62443 and in Automotive with ISO/SAE 21434 standards.I'm also the creator of SCADAsploit, an advanced C2 post-exploitation framework designed for Adversary Simulation and Red Teaming in OT/ICS environments. This powerful tool targets leading PLC manufacturers — including Siemens, Schneider Electric, Rockwell, ABB, and many more — pushing the boundaries of cyber security innovation in the industrial space.
Basically, I hack into companies to show the techniques adversaries use!
How can I help you? Feel free to drop me an email.
Use this PGP key for confidential communication.
SCADAsploit C2.OT Framework
-
I’m the developer of SCADAsploit C2.OT, a C2 (Command & Control) framework intended for OT systems. Its powerful arsenal of pre- and post-exploitation modules for SCADA/PLC systems makes it a unique tool in Adversary Simulation in the OT environment. Its malleable C2 architecture, which can be controlled remotely with a graphical commander, provides modules dedicated to red teaming, asset discovery and post-exploitation.
SCADAsploit boasts a robust client/server architecture that ensures seamless communication and collaboration between your team members. Thanks to its inherent EDR evasion, obfuscation and pivoting capabilities, SCADAsploit is also an effective and powerful tool for traditional IT infrastructures.
I had the opportunity to present SCADAsploit at the BlackHat Europe Arsenal in London on 7 December 2023, with great interest from the participants.
https://scadasploit.dev/