https://github.com/gsuberland/opcua_find_writable
Tool to find writable variables on OPC UA servers.
https://github.com/gsuberland/opcua_find_writable
industrial-automation industrial-control-systems industrial-security opc-ua opcua opcua-client opcua-server pentesting pentesting-tools python python3 security
Last synced: 2 months ago
JSON representation
Tool to find writable variables on OPC UA servers.
- Host: GitHub
- URL: https://github.com/gsuberland/opcua_find_writable
- Owner: gsuberland
- License: mit
- Created: 2021-09-10T14:33:15.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-09-10T15:27:31.000Z (over 3 years ago)
- Last Synced: 2025-02-04T20:42:40.891Z (4 months ago)
- Topics: industrial-automation, industrial-control-systems, industrial-security, opc-ua, opcua, opcua-client, opcua-server, pentesting, pentesting-tools, python, python3, security
- Language: Python
- Homepage:
- Size: 6.84 KB
- Stars: 2
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Find Writable OPC UA Variables
`opcua_find_writable.py` is a simple tool to find writable variables on [OPC UA](https://en.wikipedia.org/wiki/OPC_Unified_Architecture) servers. It enumerates all nodes in the tree and prints the path of each variable that is writable by the current user.
Usage: `python3 opcua_find_writable.py [server]`, where `[server]` is an OPC UA connection string, like `opc.tcp://10.1.2.3:4840/`
It depends on [python-opcua](https://github.com/FreeOpcUa/python-opcua).
Released under MIT License.