mrhenrike / MikrotikAPI-BFLinks
Brute force attack tool on Mikrotik box credentials exploiting API requests
☆66Updated 4 months ago
Alternatives and similar repositories for MikrotikAPI-BF
Users that are interested in MikrotikAPI-BF are comparing it to the libraries listed below
Sorting:
- # Exploit Title: Mikrotik WinBox 6.42 - Credential Disclosure (Metasploit)☆48Updated 5 years ago
- Gecko Backdoor is a most powerful web php backdoor.☆139Updated 6 months ago
- PoC for SQL Injection in CVE-2024-27956☆89Updated last year
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆78Updated last week
- acunetix-13 install in kali linux☆78Updated 2 years ago
- A simple Ransomware Generator☆53Updated last year
- ☆292Updated 3 years ago
- Nessus Professional 2023 Manual Crack - No Backdoors/Virus☆125Updated 2 years ago
- Find Real IPs hidden behind Cloudflare with Criminal IP(criminalip.io), security OSINT Tool.☆123Updated last year
- Deep scan domain and find all possible domain to takeover☆17Updated 2 years ago
- DursGo - The Go-Powered Web Application Scanner - With AI-Powered Analysis☆61Updated 2 months ago
- Cyber Security Awareness Framework (CSAF)☆100Updated 2 weeks ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Updated last year
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆116Updated 3 weeks ago
- Bug Hunter is a command-line tool designed to assist in the bug hunting process for web applications. It automates several tasks such as …☆131Updated 3 months ago
- Tutorials written by me.☆48Updated 4 years ago
- MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities☆184Updated 4 years ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- The First Open Source Bug Bounty Platform☆97Updated last week
- Open-source stealer logs parser and visualization dashboard that structures and presents log data to facilitate analysis.☆67Updated this week
- Detect Program Bug Bounty☆42Updated 8 months ago
- This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passw…☆55Updated 4 years ago
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆29Updated 2 months ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- ☆210Updated 2 years ago
- Docker Remote API Scanner and Exploit☆180Updated 2 years ago
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆166Updated last month
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆96Updated 9 months ago
- PrivacyNet: Privacy Network☆54Updated last year
- LARAPLER - Laravel Random Exploit☆22Updated 2 years ago