Simulation Tools×B7 - List of Manufacturers, Suppliers, Companies and Products

Simulation Tools Product List

1~2 item / All 2 items

Displayed results

Simulation tool "CYCLE_D"

It is possible to simulate regardless of the presence of a liquid line/suction line heat exchanger!

"CYCLE_D: NIST Vapor Compression Cycle Design Program" is a simulation tool for vapor compression refrigeration cycles. It operates with pure refrigerants or mixtures of refrigerants. It can be used for the design and optimization of refrigeration cycles, evaluation of the performance of various refrigerants, and research into new refrigeration technologies. 【Features】 ■ Scope of simulation ■ Fluids used ■ Users and benefits *For more details, please refer to the PDF materials or feel free to contact us.

  • Company:B7
  • Price:Other
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Adversary Simulation Tool "Cobalt Strike"

Evaluate the security of networks and systems! Discover vulnerabilities and simulate attacks.

"Cobalt Strike" is a penetration testing tool favored by cybersecurity professionals. Its cutting-edge threat emulation capabilities enable real-time attack simulations, strengthening corporate network defenses. By using beacon agents, it reproduces various attack scenarios and verifies the effectiveness of security measures. It conceals communication with C&C servers and mimics malware and social engineering attacks to discover and rectify blind spots in defense systems. It is also possible to leverage features from other well-known tools like Metasploit and Mimikatz. This product can be purchased individually or bundled with Core Impact (penetration testing solution). 【Features】 ■ Generates various attack tools and malware ■ Simulates cyber attacks in a long-term and covert manner ■ Allows access to other systems within the network via a web browser ■ Executes advanced phishing attacks ■ Creates detailed reports and logs of attacks ■ Mimics advanced actors with post-exploitation payloads

  • Company:B7
  • Price:Other
  • Other Software
  • Scientific Calculation and Simulation Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration