mrhenrike / MikrotikAPI-BFLinks
Brute force attack tool on Mikrotik box credentials exploiting API requests
☆65Updated 2 months ago
Alternatives and similar repositories for MikrotikAPI-BF
Users that are interested in MikrotikAPI-BF are comparing it to the libraries listed below
Sorting:
- Gecko Backdoor is a most powerful web php backdoor.☆128Updated 4 months ago
- # Exploit Title: Mikrotik WinBox 6.42 - Credential Disclosure (Metasploit)☆48Updated 5 years ago
- ☆280Updated 3 years ago
- This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passw…☆53Updated 4 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆75Updated last week
- MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities☆183Updated 4 years ago
- Pler - Domain Probe and Cloudflare Filter Tool. Pler is a simple yet powerful Python script to check whether a domain is using Cloudflare…☆22Updated 4 months ago
- PoC for SQL Injection in CVE-2024-27956☆90Updated last year
- A simple Ransomware Generator☆52Updated last year
- DursGo - The Go-Powered Web Application Scanner - With AI-Powered Analysis☆55Updated this week
- Nessus Professional 2023 Manual Crack - No Backdoors/Virus☆124Updated 2 years ago
- acunetix-13 install in kali linux☆78Updated 2 years ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆115Updated 7 months ago
- Automatically change tor ip address over time when accessing the internet. Make it private and safe for you☆148Updated last year
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆41Updated last year
- Deep scan domain and find all possible domain to takeover☆17Updated 2 years ago
- PrivacyNet: Privacy Network☆53Updated last year
- Find Real IPs hidden behind Cloudflare with Criminal IP(criminalip.io), security OSINT Tool.☆120Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- Backdoor PHP shell script.☆85Updated last year
- Docker Remote API Scanner and Exploit☆179Updated 2 years ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- Bypass 403☆163Updated 10 months ago
- Dump place details from Google Maps like phone,email,website,and reviews☆71Updated 6 months ago
- A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.☆27Updated 5 months ago
- Bug Hunter is a command-line tool designed to assist in the bug hunting process for web applications. It automates several tasks such as …☆122Updated last month
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆188Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Updated last year
- A powerful and delightful PHP WebShell☆65Updated 9 months ago