mrhenrike / MikrotikAPI-BFLinks
Brute force attack tool on Mikrotik box credentials exploiting API requests
☆49Updated 2 months ago
Alternatives and similar repositories for MikrotikAPI-BF
Users that are interested in MikrotikAPI-BF are comparing it to the libraries listed below
Sorting:
- Gecko Backdoor is a most powerful web php backdoor.☆124Updated 2 months ago
- # Exploit Title: Mikrotik WinBox 6.42 - Credential Disclosure (Metasploit)☆47Updated 4 years ago
- ☆276Updated 3 years ago
- This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passw…☆51Updated 4 years ago
- Nessus Professional 2023 Manual Crack - No Backdoors/Virus☆120Updated last year
- PoC for SQL Injection in CVE-2024-27956☆86Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploit☆105Updated 2 years ago
- A simple Ransomware Generator☆48Updated 9 months ago
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆27Updated 2 months ago
- MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities☆172Updated 3 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆71Updated last week
- Nessus is one of the many vulnerability scanners used during vulnerability assessments☆102Updated 2 years ago
- ☆111Updated last year
- WpCrack is an audit and brute force tool used to remotely test WordPress blogging software☆102Updated 2 years ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- Cyber Security Awareness Framework (CSAF)☆98Updated 4 months ago
- A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.☆24Updated this week
- Noxer is a powerful Python script designed for automating Android penetration testing tasks within the Nox Player emulator.☆232Updated last year
- Automatically change tor ip address over time when accessing the internet. Make it private and safe for you☆140Updated 7 months ago
- ☆159Updated 2 years ago
- Cloudpanel 0-day Exploit☆57Updated last year
- SQL Injection Vulnerability Scanner made with Python☆368Updated 4 months ago
- Tutorials written by me.☆46Updated 3 years ago
- Sending file through ICMP packet using PING☆18Updated 11 months ago
- Injects php payloads into jpeg images☆538Updated 4 years ago
- TCP1P CTF writeup☆31Updated 2 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆184Updated 11 months ago
- Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773☆108Updated 3 years ago
- You can get a lifetime of FREE VPS using GitHub Codespaces with Kali Linux Docker image installed on github workspace terminal.☆86Updated 5 months ago
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆40Updated last year