mrhenrike / MikrotikAPI-BF
Brute force attack tool on Mikrotik box credentials exploiting API requests
☆38Updated 7 months ago
Alternatives and similar repositories for MikrotikAPI-BF:
Users that are interested in MikrotikAPI-BF are comparing it to the libraries listed below
- Gecko Backdoor is a most powerful web php backdoor.☆110Updated last week
- # Exploit Title: Mikrotik WinBox 6.42 - Credential Disclosure (Metasploit)☆46Updated 4 years ago
- This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passw…☆50Updated 3 years ago
- Kaga is a Reverse IP Lookup tool written in PowerShell and BourneShell to make it easy to use in any environment.☆13Updated 10 months ago
- A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.☆19Updated 4 months ago
- Cloudpanel 0-day Exploit☆58Updated last year
- Dump place details from Google Maps like phone,email,website,and reviews☆67Updated last year
- acunetix-13 install in kali linux☆57Updated last year
- Dios sql injection☆22Updated 3 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆64Updated this week
- MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities☆166Updated 3 years ago
- PHP lab to test captcha bypassing☆31Updated last year
- Acunetix Professional v24.1☆11Updated 10 months ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆84Updated last year
- PrivacyNet: Privacy Network☆46Updated 4 months ago
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆26Updated 7 months ago
- Deep scan domain and find all possible domain to takeover☆16Updated last year
- LARAPLER - Laravel Random Exploit☆21Updated last year
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆40Updated 8 months ago
- ☆271Updated 2 years ago
- Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once☆48Updated 3 years ago
- Yet another PHP Obfuscator☆33Updated last month
- MStore API <= 3.9.2 - Authentication Bypass☆7Updated last year
- ☆39Updated last year
- ☆21Updated 2 years ago
- IRC botnet, that's mainly used to launch denial-of-service attacks.☆28Updated last year