mhils / tr069Links
☆29Updated 2 years ago
Alternatives and similar repositories for tr069
Users that are interested in tr069 are comparing it to the libraries listed below
Sorting:
- Сollection of TCL scripts for Cisco IOS penetration testing☆67Updated 7 years ago
- Winbox protocol experimental implementation (for testing only)☆23Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- ICMP and DNS tunneling via IPv4 and IPv6☆212Updated 4 months ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆123Updated 9 months ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- An evil bit backdoor for iptables☆53Updated 4 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Updated 5 years ago
- My Packet Captures, Quagga Tutorial, and Cisco Reversing.☆27Updated 7 years ago
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆28Updated 4 years ago
- Resurrecting and updating the best log cleaner☆33Updated 10 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆101Updated 2 years ago
- The hidden mstsc recorder player☆29Updated 5 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated last week
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- MikroTik remote jailbreak for v6.x.x☆137Updated 2 years ago
- Pre-compiled tools to tunnel TCP over RDP Connections☆87Updated 6 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- SNIcat☆127Updated 3 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42Updated 5 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆74Updated 6 years ago
- reverse socks tunneler with ntlm and proxy support☆57Updated 2 years ago
- Mikrotik SMB buffer overflow exploit☆64Updated 7 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- ☆60Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- tshark + ELK analytics virtual machine☆68Updated 6 months ago
- Exfiltrate data from a compromised target using covert channels☆16Updated 4 years ago