BigNerd95 / Chimay-RedLinks
Working POC of Mikrotik exploit from Vault 7 CIA Leaks
☆658Updated 2 years ago
Alternatives and similar repositories for Chimay-Red
Users that are interested in Chimay-Red are comparing it to the libraries listed below
Sorting:
- Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)☆515Updated 4 years ago
- RouterOS Security Research Tooling and Proof of Concepts☆887Updated 2 years ago
- Mikrotik SMB buffer overflow exploit☆64Updated 7 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆112Updated 8 months ago
- Tools for Mikrotik devices☆552Updated 5 years ago
- BadUSB in Routers☆197Updated 2 years ago
- Smart Install Exploitation Tool☆582Updated 3 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆208Updated 8 years ago
- Proof of Concept of Winbox Critical Vulnerability☆217Updated 5 years ago
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 4 years ago
- Exploits and Security Tools Framework 2.0.1☆306Updated 2 years ago
- Scan and Export RouterOS Password☆151Updated 6 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆344Updated 8 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆411Updated 5 years ago
- Auto Root Exploit Tool☆531Updated 2 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Updated 7 years ago
- Public repository for improvements to the EXTRABACON exploit☆160Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 3 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆330Updated 6 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆316Updated 6 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆327Updated 6 years ago
- Password bruteforcer for MikroTik devices or boxes running RouterOS☆181Updated 5 years ago
- powerful auto-backdooring utility☆747Updated 7 years ago
- Offensive DNS server☆318Updated 3 years ago
- Scans for accessibility tools backdoors via RDP☆340Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- UAC 0day, all day!☆279Updated 7 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year