mrhenrike / MikrotikAPI-BFLinks
Brute force attack tool on Mikrotik box credentials exploiting API requests
☆65Updated 3 months ago
Alternatives and similar repositories for MikrotikAPI-BF
Users that are interested in MikrotikAPI-BF are comparing it to the libraries listed below
Sorting:
- # Exploit Title: Mikrotik WinBox 6.42 - Credential Disclosure (Metasploit)☆48Updated 5 years ago
- Gecko Backdoor is a most powerful web php backdoor.☆138Updated 5 months ago
- MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities☆184Updated 4 years ago
- ☆291Updated 3 years ago
- PoC for SQL Injection in CVE-2024-27956☆89Updated last year
- Pler - Domain Probe and Cloudflare Filter Tool. Pler is a simple yet powerful Python script to check whether a domain is using Cloudflare…☆22Updated 5 months ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆77Updated this week
- This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passw…☆55Updated 4 years ago
- Nessus Professional 2023 Manual Crack - No Backdoors/Virus☆124Updated 2 years ago
- A simple Ransomware Generator☆52Updated last year
- acunetix-13 install in kali linux☆79Updated 2 years ago
- This Python script allows you to generate Nessus Professional Keys directly without having to fill out the registration form. It simplifi…☆112Updated last year
- DursGo - The Go-Powered Web Application Scanner - With AI-Powered Analysis☆60Updated last month
- Bug Hunter is a command-line tool designed to assist in the bug hunting process for web applications. It automates several tasks such as …☆129Updated 3 months ago
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆28Updated last month
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆165Updated 3 weeks ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆333Updated 4 months ago
- Cyber Security Awareness Framework (CSAF)☆100Updated 2 weeks ago
- Proof of concept for DoS exploit☆53Updated 2 years ago
- Automatically change tor ip address over time when accessing the internet. Make it private and safe for you☆148Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆187Updated last year
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆42Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- Backdoor PHP shell script.☆84Updated last year
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆89Updated last year
- You can get a lifetime of FREE VPS using GitHub Codespaces with Kali Linux Docker image installed on github workspace terminal. (beginner…☆106Updated 4 months ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Updated last year
- Powerfull Automatic Sql injection Tools Pack☆122Updated 4 years ago
- PrivacyNet: Privacy Network☆54Updated last year