BasuCert / WinboxPoCLinks
Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)
☆520Updated 5 years ago
Alternatives and similar repositories for WinboxPoC
Users that are interested in WinboxPoC are comparing it to the libraries listed below
Sorting:
- Proof of Concept of Winbox Critical Vulnerability☆220Updated 6 years ago
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆662Updated 3 years ago
- RouterOS Security Research Tooling and Proof of Concepts☆895Updated 3 years ago
- Scan and Export RouterOS Password☆157Updated 7 years ago
- Tools for Mikrotik devices☆573Updated 5 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆117Updated last year
- A tool for sniffing PPPoE username/password for any brand of router☆160Updated 7 years ago
- Password bruteforcer for MikroTik devices or boxes running RouterOS☆183Updated 5 years ago
- (CVE-2018-9995) Get DVR Credentials☆552Updated 6 years ago
- RouterOS security testing tools☆84Updated 5 years ago
- B4TM4N ~ PHP WEBSHELL☆190Updated last year
- Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.☆766Updated 2 years ago
- Sockstress (TCP DoS) implementation.☆211Updated last year
- A Simple Multi-Threaded SSH Brute Forcer☆278Updated 5 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.☆78Updated 7 years ago
- MASSCAN Web UI☆498Updated 3 years ago
- A Simple Reflection and Amplification DoS Attack Tool Based on Saddam.☆29Updated 6 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- A tool which exploits a backdoor in Hikvision camera firmwares circa 2014-2016 to help the owner change a forgotten password.☆260Updated 6 years ago
- double-free bug in WhatsApp exploit poc☆268Updated 4 years ago
- Clear all your logs in [linux/windows] servers 🛡️☆315Updated 4 years ago
- BadUSB in Routers☆197Updated 3 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆336Updated 6 years ago
- DHCP exhaustion script written in python using scapy network library☆353Updated 2 weeks ago
- Mikrotik SMB buffer overflow exploit☆66Updated 7 years ago
- Auto Root Exploit Tool☆532Updated 2 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆413Updated 5 years ago
- mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4☆113Updated 5 years ago
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆330Updated 4 years ago
- PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script☆20Updated 6 years ago