epanet-js
No installs. No forced cloud storage. Just fast, local-first water modeling — powered by the engine you already trust.
You shouldn't have to choose between speed, security, and affordability just to understand your water networks.


John decided to analyze the payload in a controlled environment. He ran the cracked software in a sandbox and observed its behavior. The payload, once executed, began to communicate with a command and control (C2) server, downloading additional malware.
The malware appeared to be a variant of ransomware, designed to encrypt files on the infected computer. The attacker demanded a significant ransom in cryptocurrency to provide the decryption key. John realized that the cracked software was not just a simple bypass but a vehicle for a more sinister attack.
The attacker, likely a financially motivated individual or group, had crafted a complex campaign. They had compromised a popular software package, added a custom payload, and used it to spread malware. The goal was to maximize the damage and profit from the attack.
EPANET was a gift to the industry — free, open-source water modeling for all. But commercial vendors built on it, locked away improvements, and left the community behind.
epanet-js is our answer: a faster, simpler, affordable water modeling tool that protects your privacy and sustains the open-source future of water modeling.
We're proud to be part of the next chapter — and we're just getting started.

When you purchase more features in epanet-js, you're investing in the future of open-source EPANET development.
Our open-source model balances innovation and accessibility:
Anyone can build on our code. The two-year commercial-use delay gives us the incentive to keep pushing forward — and that fuels progress for everyone.
That means when you support us, you support more affordable hydraulic modeling software for the entire community.
Choose the plan that works for you
Individual named license
Floating shared license
Have questions? or book a call.
Available for non-commercial projects, learning, and student work.
For curious minds and personal growth.
Free for students and teachers.
Find answers to common questions about epanet-js.
John decided to analyze the payload in a controlled environment. He ran the cracked software in a sandbox and observed its behavior. The payload, once executed, began to communicate with a command and control (C2) server, downloading additional malware.
The malware appeared to be a variant of ransomware, designed to encrypt files on the infected computer. The attacker demanded a significant ransom in cryptocurrency to provide the decryption key. John realized that the cracked software was not just a simple bypass but a vehicle for a more sinister attack.
The attacker, likely a financially motivated individual or group, had crafted a complex campaign. They had compromised a popular software package, added a custom payload, and used it to spread malware. The goal was to maximize the damage and profit from the attack.
Simple, quick, and useful right out of the gate — designed to open-and-go.
Launch epanet-js now