CVE-2019-6487. A command injection vulnerability in TP-Link WDR5620 Series up to verion 3.
☆41Jan 19, 2019Updated 7 years ago
Alternatives and similar repositories for TP-Link-WDR-Router-Command-injection_POC
Users that are interested in TP-Link-WDR-Router-Command-injection_POC are comparing it to the libraries listed below
Sorting:
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆46Jan 26, 2019Updated 7 years ago
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- "Collection of IoT vulnerability research and exploits, focusing on unauthorized access, CVEs, and popular devices like TP-LINK, Tenda, D…☆20Jan 20, 2025Updated last year
- Plugin to visualize Miasm IR graph in Binary Ninja.☆14Aug 7, 2019Updated 6 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Perform with Massive Command Injection (Chamilo)☆23Jul 31, 2023Updated 2 years ago
- ☆12Jul 25, 2019Updated 6 years ago
- Hardware and software for the ECU we use during trainings☆15Apr 29, 2019Updated 6 years ago
- Firmware for the Zyxel VMG3925-B10B☆22Feb 12, 2020Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆21May 9, 2019Updated 6 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- ☆17Jun 17, 2022Updated 3 years ago
- Zyxel password decrypter☆44May 3, 2022Updated 3 years ago
- Metasploit modules in testing☆14Jul 21, 2019Updated 6 years ago
- ☆15Jan 24, 2021Updated 5 years ago
- ☆15Mar 3, 2026Updated 2 weeks ago
- ☆26Sep 2, 2025Updated 6 months ago
- Python exploit of cve-2020-7247☆25Feb 19, 2020Updated 6 years ago
- Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239☆24Nov 1, 2020Updated 5 years ago
- How to get a linux kernel debug environment☆31Apr 7, 2018Updated 7 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- ☆10Jun 1, 2022Updated 3 years ago
- ☆10May 12, 2017Updated 8 years ago
- Homo Network - The best ddos botnet in 2023☆13Apr 27, 2023Updated 2 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- Stana - A strace output parser and analyser☆32Aug 21, 2018Updated 7 years ago
- 基于angr的污点分析引擎☆41Apr 19, 2019Updated 6 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- ☆32Apr 28, 2022Updated 3 years ago
- uploads unlimited files to mega.nz without a subscription☆12Updated this week
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 3 years ago
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆11Jan 7, 2023Updated 3 years ago
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆14Nov 20, 2025Updated 4 months ago
- A Python client to control TPLink router☆39Apr 16, 2023Updated 2 years ago
- Peer to Peer botnet☆13Aug 7, 2020Updated 5 years ago
- A small SSH server written in Go that checks for weak SSH keys☆14Feb 26, 2016Updated 10 years ago
- this is a repository for MIPS tools.You can find some statically linked tools like GDB\TCPDUMP\GDBSERVER, which can used for IOT security…☆10Nov 20, 2020Updated 5 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago