MATRIX, or Modbus Attack Tool for Remote Industrial eXploitation, is a powerful tool designed for security testing of Modbus TCP protocol implementations. As industries increasingly rely on connected devices, the need for robust security measures becomes critical. MATRIX provides a comprehensive suite of features to assess vulnerabilities in industrial control systems (ICS) and cyber-physical systems (CPS).
This tool is open-source and aims to facilitate security research and education in the field of offensive security. Whether you're a researcher, a student, or a professional, MATRIX equips you with the capabilities to understand and test Modbus TCP systems effectively.
For the latest updates and downloads, visit our Releases section.
MATRIX offers a variety of features tailored for security professionals:
- Command-Line Interface: Easy to use for both beginners and experts.
- Packet Analysis: Inspect and manipulate packets in real-time.
- Replay Attacks: Simulate previous attack scenarios to assess system resilience.
- Denial of Service (DoS) Attacks: Test the robustness of Modbus TCP implementations.
- Spoofing Attacks: Mimic legitimate devices to exploit vulnerabilities.
- Educational Simulations: Learn about Modbus TCP protocols through practical exercises.
- Open-Source: Freely available for anyone to use and contribute.
To install MATRIX, follow these steps:
-
Clone the Repository:
git clone https://github.com/dekdokdang/MATRIX.git
-
Navigate to the Directory:
cd MATRIX
-
Install Dependencies: Make sure you have Python 3 installed. Then, install the required packages using pip:
pip install -r requirements.txt
-
Download the Latest Release: For the latest features and fixes, download the latest version from our Releases section and execute the necessary files.
Using MATRIX is straightforward. Here are some common commands to get you started:
-
Start the Tool:
python matrix.py
-
Run a Packet Capture:
python matrix.py capture
-
Perform a Replay Attack:
python matrix.py replay --file attack_packets.pcap
-
Performing a DoS Attack:
python matrix.py dos --target 192.168.1.100
-
Spoofing a Device:
python matrix.py spoof --target 192.168.1.101 --source 192.168.1.102
For a complete list of commands and options, use:
python matrix.py --help
We welcome contributions from the community! If you'd like to contribute to MATRIX, please follow these steps:
- Fork the Repository: Click the "Fork" button on the top right corner.
- Create a New Branch:
git checkout -b feature/YourFeatureName
- Make Your Changes: Implement your feature or fix.
- Commit Your Changes:
git commit -m "Add your message here"
- Push to Your Branch:
git push origin feature/YourFeatureName
- Create a Pull Request: Go to the original repository and click on "New Pull Request".
We appreciate your contributions and feedback!
MATRIX is licensed under the MIT License. You can freely use, modify, and distribute this tool as long as you include the original license in your distribution.
We would like to thank the open-source community for their contributions and support. Special thanks to the developers and researchers who have provided invaluable insights into Modbus TCP security.
For questions or support, please reach out to the project maintainers:
- Email: [email protected]
- GitHub: MATRIX Repository
Feel free to report issues or suggest features directly on the GitHub page.
For the latest updates and downloads, visit our Releases section.
Thank you for using MATRIX! Your contributions help make industrial systems safer.