hkm / routerpwn.comView external linksLinks
Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.
☆139Mar 13, 2016Updated 9 years ago
Alternatives and similar repositories for routerpwn.com
Users that are interested in routerpwn.com are comparing it to the libraries listed below
Sorting:
- Some of my Nmap scripts☆22Aug 3, 2017Updated 8 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18May 14, 2020Updated 5 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- One-off scripts☆52Sep 4, 2017Updated 8 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Oct 27, 2020Updated 5 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Jan 10, 2017Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- A malware/botnet analysis framework written in Ruby.☆195Sep 26, 2023Updated 2 years ago
- Educational Exploitable Web Application☆24Feb 9, 2016Updated 10 years ago
- A tool for recover router password☆33Jun 19, 2018Updated 7 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Sep 24, 2014Updated 11 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 9 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- XXE OOB Exploitation Toolset for Automation☆63Jan 20, 2014Updated 12 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Connection-less Powershell Persistent and Resilient Backdoor☆232Sep 23, 2015Updated 10 years ago
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated 2 weeks ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84May 9, 2014Updated 11 years ago