Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)
☆519Oct 16, 2020Updated 5 years ago
Alternatives and similar repositories for WinboxPoC
Users that are interested in WinboxPoC are comparing it to the libraries listed below
Sorting:
- Proof of Concept of Winbox Critical Vulnerability☆222Jul 13, 2019Updated 6 years ago
- Tools for Mikrotik devices☆579Feb 19, 2020Updated 6 years ago
- RouterOS Security Research Tooling and Proof of Concepts☆902Nov 29, 2022Updated 3 years ago
- Scan and Export RouterOS Password☆160Aug 24, 2018Updated 7 years ago
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆662Sep 20, 2022Updated 3 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Oct 8, 2018Updated 7 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆118Sep 29, 2024Updated last year
- Mikrotik SMB buffer overflow exploit☆66Mar 18, 2018Updated 7 years ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆206Feb 15, 2024Updated 2 years ago
- Tools to encrypt/decrypt and pack/unpack RouterOS v6.13+ backup files☆330Sep 10, 2022Updated 3 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- RouterOS (Mikrotik) Backup over SSH☆19Feb 17, 2014Updated 12 years ago
- nmap模块扫描端口服务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.☆79Jun 11, 2018Updated 7 years ago
- MikroTik RouterOS Winbox未经身份验证的任意文件读/写漏洞☆30Dec 16, 2018Updated 7 years ago
- Password bruteforcer for MikroTik devices or boxes running RouterOS☆184Jun 19, 2020Updated 5 years ago
- BadUSB in Routers☆198Nov 29, 2022Updated 3 years ago
- Brute forcer and shell deployer for WildFly☆100Mar 10, 2018Updated 7 years ago
- ☆164May 18, 2018Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆169May 23, 2018Updated 7 years ago
- ☆18May 18, 2018Updated 7 years ago
- Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container☆48Apr 20, 2024Updated last year
- A custom web vulnerability scanner☆28Nov 17, 2018Updated 7 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- CVE-2018-19537☆20Nov 26, 2018Updated 7 years ago
- WebLogic Exploit☆143Jul 13, 2018Updated 7 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- Python tools for manipulating Mikrotik NPK format☆85Jun 9, 2015Updated 10 years ago
- (CVE-2018-9995) Get DVR Credentials☆553Jan 23, 2019Updated 7 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- 基于burpsuite headless 的代理式被动扫描系统☆95Feb 10, 2020Updated 6 years ago
- A debugger in Python for Cisco c3560☆10Apr 24, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago