mhils / tr069Links
☆29Updated 3 years ago
Alternatives and similar repositories for tr069
Users that are interested in tr069 are comparing it to the libraries listed below
Sorting:
- Winbox protocol experimental implementation (for testing only)☆23Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 6 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆130Updated 4 years ago
- Сollection of TCL scripts for Cisco IOS penetration testing☆67Updated 7 years ago
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆28Updated 4 years ago
- Mikrotik SMB buffer overflow exploit☆65Updated 7 years ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆57Updated 3 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆124Updated 11 months ago
- My Packet Captures, Quagga Tutorial, and Cisco Reversing.☆28Updated 7 years ago
- Fortigate password recovery☆18Updated 7 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆105Updated 2 years ago
- The LKM rootkit working in Linux Kernels 2.6.x/3.x/4.x/5.x☆132Updated 2 years ago
- DDoor - cross platform backdoor using dns txt records☆30Updated 4 years ago
- An evil bit backdoor for iptables☆54Updated 4 years ago
- MikroTik remote jailbreak for v6.x.x☆143Updated 2 years ago
- bdvl☆114Updated 3 years ago
- A Linux RAT in C☆34Updated 6 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆14Updated 5 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆18Updated 5 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- Proofs of concept which successfully authenticate with MikroTik Winbox and MAC Telnet servers running on RouterOS version 6.45.1+☆79Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 5 years ago
- Cisco ASA Software and ASDM Security Research☆85Updated 3 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆38Updated 6 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Information about a signed UEFI Shell that can be used when Secure Boot is enabled.☆83Updated 4 years ago
- List of possible Linux backdoors☆14Updated 5 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago