mrhenrike / MikrotikAPI-BFLinks
Brute force attack tool on Mikrotik box credentials exploiting API requests
☆64Updated last month
Alternatives and similar repositories for MikrotikAPI-BF
Users that are interested in MikrotikAPI-BF are comparing it to the libraries listed below
Sorting:
- Gecko Backdoor is a most powerful web php backdoor.☆126Updated 3 months ago
- # Exploit Title: Mikrotik WinBox 6.42 - Credential Disclosure (Metasploit)☆48Updated 5 years ago
- ☆279Updated 3 years ago
- This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passw…☆53Updated 4 years ago
- MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities☆181Updated 4 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆75Updated 3 weeks ago
- PoC for SQL Injection in CVE-2024-27956☆90Updated last year
- A simple Ransomware Generator☆51Updated last year
- acunetix-13 install in kali linux☆77Updated 2 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆113Updated 6 months ago
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆42Updated last year
- Pler - Domain Probe and Cloudflare Filter Tool. Pler is a simple yet powerful Python script to check whether a domain is using Cloudflare…☆22Updated 3 months ago
- Bug Hunter is a command-line tool designed to assist in the bug hunting process for web applications. It automates several tasks such as …☆120Updated 3 weeks ago
- Deep scan domain and find all possible domain to takeover☆17Updated 2 years ago
- Backdoor PHP shell script.☆83Updated last year
- Domain Availability Checker☆167Updated 3 months ago
- Classic Web shell upload techniques & Web RCE techniques☆49Updated last month
- Proof of concept for DoS exploit☆54Updated 2 years ago
- PrivacyNet: Privacy Network☆51Updated last year
- You can get a lifetime of FREE VPS using GitHub Codespaces with Kali Linux Docker image installed on github workspace terminal. (beginner…☆100Updated last month
- This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.☆48Updated last year
- DursGo - The Go-Powered Web Application Scanner - With AI-Powered Analysis☆51Updated last month
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- 「🔎」CORS vulnerability scanner☆12Updated 11 months ago
- Automatically change tor ip address over time when accessing the internet. Make it private and safe for you☆148Updated 11 months ago
- Dios sql injection☆22Updated 4 years ago
- 🔮 Python Remote administration tool via telegram☆54Updated 7 months ago
- Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773☆112Updated 3 years ago