PLCinject Logo

PLCinject

0
Free
Visit Website

Brought to you by www.SCADACS.org. Compiling As easy as $ make Usually this is enough. Then you can find the binary in the current dir. Troubleshooting This tool depends on the Snap7 library available at http://sourceforge.net/projects/snap7/. Compilation error We include the libraries of the latest release (1.4.0) and use the Linux x86_64 version for compiling. If you need a different version, you'll have to pick it from the snap7/release/ dir and copy it to lib/. If that won't work, you'll have to get the full release of Snap7, compile it yourself and copy the library to lib/. cannot open shared object file PLCinject is dynamically linked with the Snap7's shared library in lib/. If you (re)move the binary or the library, it won't work. Usage The directory given by parameter -f must only contain the blocks to download to the plc. The filename convention is <blocktype>_<blocknumber>.mc7 (e.g. "FC_1000.mc7") usage: plcinject -c ip [-r rack=0] [-s slot=2] [-b block] [-p block] [-f dir] [-d] -d Display available blocks on PLC -p Block that has to be injected/patched with a call instruction: OBx, FBx or FCx on PLC, e.g. OB1 -b Block to call -f Path to your block(s) you want to inject

FEATURES

ALTERNATIVES

Scans SPF and DMARC records for issues that could allow email spoofing.

Catch possible phishing domains in near real time by looking for suspicious TLS certificate issuances reported to the Certificate Transparency Log (CTL) via the CertStream API.

A set of tools for securing JavaScript projects against software supply chain attacks.

Rspamd is an advanced spam filtering system and email processing framework with comprehensive features like Lua API and asynchronous network API.

A lightweight library for device identification and fingerprinting, written in Kotlin and 100% crash-free.

A comprehensive checklist for securing Android apps

A next-generation file integrity monitoring and change detection system

A security testing framework for Android with tools to search for vulnerabilities and interact with the Android Runtime.