BigNerd95 / Chimay-Red
Working POC of Mikrotik exploit from Vault 7 CIA Leaks
☆657Updated 2 years ago
Alternatives and similar repositories for Chimay-Red:
Users that are interested in Chimay-Red are comparing it to the libraries listed below
- RouterOS Security Research Tooling and Proof of Concepts☆875Updated 2 years ago
- Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)☆510Updated 4 years ago
- Tools for Mikrotik devices☆541Updated 4 years ago
- Mikrotik SMB buffer overflow exploit☆63Updated 6 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.☆74Updated 6 years ago
- DNS-Shell is an interactive Shell over DNS channel☆523Updated 4 years ago
- Smart Install Exploitation Tool☆574Updated 3 years ago
- Auto Root Exploit Tool☆531Updated last year
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Updated 7 years ago
- Scan and Export RouterOS Password☆147Updated 6 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆208Updated 7 years ago
- Scans for accessibility tools backdoors via RDP☆334Updated 6 years ago
- Password bruteforcer for MikroTik devices or boxes running RouterOS☆182Updated 4 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆318Updated 6 years ago
- MASSCAN Web UI☆485Updated 2 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆110Updated 4 months ago
- Script to steal passwords from ssh.☆478Updated 6 years ago
- BadUSB in Routers☆194Updated 2 years ago
- Proof of Concept of Winbox Critical Vulnerability☆215Updated 5 years ago
- Exploits and Security Tools Framework 2.0.1☆305Updated 2 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆465Updated 8 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆345Updated 8 years ago
- SSLStrip version to defeat HSTS☆315Updated 7 years ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆263Updated 7 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆742Updated last year
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆493Updated 7 years ago
- tool to extract passwords from TeamViewer memory using Frida☆462Updated 6 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆327Updated 5 years ago