BasuCert / WinboxPoCLinks
Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)
☆517Updated 4 years ago
Alternatives and similar repositories for WinboxPoC
Users that are interested in WinboxPoC are comparing it to the libraries listed below
Sorting:
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆660Updated 2 years ago
- Proof of Concept of Winbox Critical Vulnerability☆218Updated 6 years ago
- RouterOS Security Research Tooling and Proof of Concepts☆890Updated 2 years ago
- Scan and Export RouterOS Password☆154Updated 7 years ago
- Tools for Mikrotik devices☆560Updated 5 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆115Updated 11 months ago
- Password bruteforcer for MikroTik devices or boxes running RouterOS☆182Updated 5 years ago
- A tool for sniffing PPPoE username/password for any brand of router☆154Updated 7 years ago
- RouterOS security testing tools☆84Updated 5 years ago
- B4TM4N ~ PHP WEBSHELL☆190Updated last year
- A Simple Multi-Threaded SSH Brute Forcer☆276Updated 5 years ago
- double-free bug in WhatsApp exploit poc☆266Updated 4 years ago
- MASSCAN Web UI☆494Updated 2 years ago
- A tool which exploits a backdoor in Hikvision camera firmwares circa 2014-2016 to help the owner change a forgotten password.☆259Updated 5 years ago
- A Simple Reflection and Amplification DoS Attack Tool Based on Saddam.☆28Updated 6 years ago
- Auto Root Exploit Tool☆533Updated 2 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.☆79Updated 7 years ago
- Offensive DNS server☆320Updated 3 years ago
- Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.☆744Updated 2 years ago
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆319Updated 3 years ago
- Sockstress (TCP DoS) implementation.☆207Updated last year
- DNS-Shell is an interactive Shell over DNS channel☆527Updated 4 years ago
- Mikrotik SMB buffer overflow exploit☆65Updated 7 years ago
- discontinued☆527Updated 2 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script☆20Updated 5 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆331Updated 6 years ago
- BadUSB in Routers☆198Updated 2 years ago
- Yet another one hard-hitting tool to run HTTP stress tests 🌌☆177Updated 4 years ago
- Smart Install Exploitation Tool☆582Updated 3 years ago