BigNerd95 / Chimay-RedLinks
Working POC of Mikrotik exploit from Vault 7 CIA Leaks
☆658Updated 2 years ago
Alternatives and similar repositories for Chimay-Red
Users that are interested in Chimay-Red are comparing it to the libraries listed below
Sorting:
- RouterOS Security Research Tooling and Proof of Concepts☆883Updated 2 years ago
- Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)☆515Updated 4 years ago
- Tools for Mikrotik devices☆552Updated 5 years ago
- Mikrotik SMB buffer overflow exploit☆64Updated 7 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆208Updated 8 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆111Updated 8 months ago
- Smart Install Exploitation Tool☆581Updated 3 years ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 4 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆330Updated 6 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆316Updated 6 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Updated 7 years ago
- Proof of Concept of Winbox Critical Vulnerability☆216Updated 5 years ago
- Scans for accessibility tools backdoors via RDP☆340Updated 7 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.☆77Updated 6 years ago
- Scan and Export RouterOS Password☆150Updated 6 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆410Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- A python reverse shell that uses DNS as the c2 channel☆507Updated 9 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Updated 7 years ago
- Public repository for improvements to the EXTRABACON exploit☆160Updated 8 years ago
- MASSCAN Web UI☆491Updated 2 years ago
- A PowerShell example of the Windows zero day priv esc☆327Updated 6 years ago
- A WebSocket C2 Tool☆397Updated 7 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆324Updated 9 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆501Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 3 years ago
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆313Updated 3 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆270Updated last year
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆407Updated 8 years ago
- UAC 0day, all day!☆278Updated 7 years ago