MarginResearch / FOIStedLinks
MikroTik remote jailbreak for v6.x.x
☆137Updated 2 years ago
Alternatives and similar repositories for FOISted
Users that are interested in FOISted are comparing it to the libraries listed below
Sorting:
- Proofs of concept which successfully authenticate with MikroTik Winbox and MAC Telnet servers running on RouterOS version 6.45.1+☆78Updated 3 years ago
- ☆277Updated 2 years ago
- Zyxel password decrypter☆38Updated 3 years ago
- my advisory, poc, slides and scripts related to IoT/protocol security☆65Updated last year
- Cisco ASA Software and ASDM Security Research☆85Updated 2 years ago
- CVE-2023-4911 proof of concept☆168Updated last year
- Decrypt encrypted Fortienet FortiOS firmware images☆131Updated 2 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- KeyTrap (DNSSEC)☆42Updated last year
- LPE exploit for CVE-2024-0582 (io_uring)☆101Updated last year
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆164Updated last year
- xortigate-cve-2023-27997☆64Updated last year
- Reverse Engineering and Observability toolkit for Draytek firewalls☆40Updated 5 months ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- A full-featured open-source Wi-Fi fuzzer☆192Updated last month
- ☆215Updated last year
- A collection of tools for security research on Starlink's User Terminal☆147Updated last year
- POC of CVE-2023-35086 only DoS☆44Updated 2 years ago
- ☆124Updated last year
- eBPF hacks☆187Updated 7 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆116Updated last year
- Research tools developed for Intel Wi-Fi chips☆55Updated last month
- ☆205Updated 9 months ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- Winbox protocol experimental implementation (for testing only)☆23Updated 5 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- ☆101Updated 7 months ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆20Updated last year
- DrayTek Vigor password recovery, config & firmware tools - NOT MAINTAINED, CHECK☆70Updated 8 years ago