BigNerd95 / Chimay-RedLinks
Working POC of Mikrotik exploit from Vault 7 CIA Leaks
☆661Updated 3 years ago
Alternatives and similar repositories for Chimay-Red
Users that are interested in Chimay-Red are comparing it to the libraries listed below
Sorting:
- RouterOS Security Research Tooling and Proof of Concepts☆891Updated 2 years ago
- Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)☆520Updated 5 years ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 5 years ago
- Script to steal passwords from ssh.☆484Updated 6 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Updated 7 years ago
- just for fun ¯\_(ツ)_/¯☆272Updated 9 years ago
- Auto Root Exploit Tool☆531Updated 2 years ago
- CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC☆207Updated 8 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆413Updated 5 years ago
- Smart Install Exploitation Tool☆586Updated 3 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 4 years ago
- Scans for accessibility tools backdoors via RDP☆340Updated 7 years ago
- Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script.☆326Updated 4 years ago
- tool to extract passwords from TeamViewer memory using Frida☆464Updated 7 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆316Updated 7 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆495Updated last year
- Tools for Mikrotik devices☆563Updated 5 years ago
- Offensive DNS server☆322Updated 3 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆501Updated 4 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆346Updated 8 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆468Updated 8 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆334Updated 6 years ago
- Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).☆315Updated 5 years ago
- SSLStrip version to defeat HSTS☆321Updated 8 years ago
- Running CVE-2017-8759 exploit sample.☆255Updated 5 years ago
- Modified hostapd to facilitate AP impersonation attacks☆515Updated 7 years ago
- MASSCAN Web UI☆499Updated 3 years ago
- An exploit for Apache Struts CVE-2018-11776☆302Updated 7 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Updated 8 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆273Updated 2 years ago