SMOD Logo

SMOD

0
Free
Visit Website

SMOD is a modular framework with every kind of diagnostic and offensive feature you could need in order to pentest Modbus protocol. It is a full Modbus protocol implementation using Python and Scapy. This software could be run on Linux/OSX under Python 2.7.x. SCADA (Process Control Networks) based systems have moved from proprietary closed networks to open source solutions and TCP/IP enabled networks steadily over recent years. This has made them vulnerable to the same security vulnerabilities that face our traditional computer networks. The Modbus/TCP protocol was used as the reference protocol to display the effectiveness of the test bed in carrying out cyber attacks on a power system protocol. Modbus/TCP was chosen specifically for these reasons: Modbus is still widely used in power systems, Modbus/TCP is simple and easy to implement, and Modbus protocol libraries are freely available for utilities to implement smart grid applications. You can use this tool for vulnerability assessment of a Modbus protocol. Just a little demo showing off the basics: root@kali:~/smod# python smod.py _______ < SMOD > ------- \ ^__^ \ (xx)\_______ (__)\/\ U ||----w | SMOD >help

FEATURES

ALTERNATIVES

Utilizes dirtyc0w kernel exploit for privilege escalation in a Docker container.

A digital archive of the internet, allowing users to capture and browse archived web pages.

Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.

A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.

Phrack Magazine is a digital magazine that focuses on computer security and hacking, featuring articles, interviews, and tutorials on various topics related to computer security.

A lightweight, first-stage C2 implant written in Nim for remote access and control.

Generates shellcode that loads Windows payloads from memory and runs them with parameters.

A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.