PLCinject Logo

PLCinject

0
Free
Visit Website

Brought to you by www.SCADACS.org. Compiling As easy as $ make Usually this is enough. Then you can find the binary in the current dir. Troubleshooting This tool depends on the Snap7 library available at http://sourceforge.net/projects/snap7/. Compilation error We include the libraries of the latest release (1.4.0) and use the Linux x86_64 version for compiling. If you need a different version, you'll have to pick it from the snap7/release/ dir and copy it to lib/. If that won't work, you'll have to get the full release of Snap7, compile it yourself and copy the library to lib/. cannot open shared object file PLCinject is dynamically linked with the Snap7's shared library in lib/. If you (re)move the binary or the library, it won't work. Usage The directory given by parameter -f must only contain the blocks to download to the plc. The filename convention is <blocktype>_<blocknumber>.mc7 (e.g. "FC_1000.mc7") usage: plcinject -c ip [-r rack=0] [-s slot=2] [-b block] [-p block] [-f dir] [-d] -d Display available blocks on PLC -p Block that has to be injected/patched with a call instruction: OBx, FBx or FCx on PLC, e.g. OB1 -b Block to call -f Path to your block(s) you want to inject

FEATURES

ALTERNATIVES

Steghide is a steganography program for hiding data in image and audio files.

King Phisher is a phishing campaign toolkit for testing and promoting user awareness through simulated attacks.

Aggregates known Android security vulnerabilities with detailed examples and analysis.

A data-mining and deep web asset search engine for breach analysis and prevention services.

DroidBox is a tool for dynamic analysis of Android applications, providing insights into package behavior and security.

Industrial control system automation and testing tool for SCADA security testing.

Detect and warn about potential malicious behaviors in Android applications through static analysis.

StegSolve is a steganography analysis tool with image analysis features.