PLCinject Logo

PLCinject

PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.

99
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

PLCinject Description

Brought to you by www.SCADACS.org. Compiling As easy as $ make Usually this is enough. Then you can find the binary in the current dir. Troubleshooting This tool depends on the Snap7 library available at http://sourceforge.net/projects/snap7/. Compilation error We include the libraries of the latest release (1.4.0) and use the Linux x86_64 version for compiling. If you need a different version, you'll have to pick it from the snap7/release/ dir and copy it to lib/. If that won't work, you'll have to get the full release of Snap7, compile it yourself and copy the library to lib/. cannot open shared object file PLCinject is dynamically linked with the Snap7's shared library in lib/. If you (re)move the binary or the library, it won't work. Usage The directory given by parameter -f must only contain the blocks to download to the plc. The filename convention is <blocktype>_<blocknumber>.mc7 (e.g. "FC_1000.mc7") usage: plcinject -c ip [-r rack=0] [-s slot=2] [-b block] [-p block] [-f dir] [-d] -d Display available blocks on PLC -p Block that has to be injected/patched with a call instruction: OBx, FBx or FCx on PLC, e.g. OB1 -b Block to call -f Path to your block(s) you want to inject

PLCinject FAQ

Common questions about PLCinject including features, pricing, alternatives, and user reviews.

PLCinject is PLCinject is a tool for injecting and patching blocks on PLCs with a call instruction.. It is a Security Operations solution designed to help security teams with Plc, Binary Analysis.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Attify Offensive IoT Exploitation Logo

Private training course for IoT device pentesting and exploitation

0
Nightwing DejaVM Logo

Whole-system emulation environment for software dev, debugging, testing & security

0
Zenyard RE Agent Logo

AI agent for in-depth binary analysis and reverse engineering assistance.

0
Boomerang Decompiler Logo

An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.

0
Shellcode2PE Logo

A Python script that converts shellcode into a PE32 or PE32+ file.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox