mrhenrike / MikrotikAPI-BFLinks
Brute force attack tool on Mikrotik box credentials exploiting API requests
☆65Updated 3 months ago
Alternatives and similar repositories for MikrotikAPI-BF
Users that are interested in MikrotikAPI-BF are comparing it to the libraries listed below
Sorting:
- # Exploit Title: Mikrotik WinBox 6.42 - Credential Disclosure (Metasploit)☆48Updated 5 years ago
- Gecko Backdoor is a most powerful web php backdoor.☆133Updated 5 months ago
- ☆289Updated 3 years ago
- MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities☆184Updated 4 years ago
- A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.☆27Updated 5 months ago
- PoC for SQL Injection in CVE-2024-27956☆89Updated last year
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆75Updated this week
- acunetix-13 install in kali linux☆78Updated 2 years ago
- Pler - Domain Probe and Cloudflare Filter Tool. Pler is a simple yet powerful Python script to check whether a domain is using Cloudflare…☆22Updated 4 months ago
- This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passw…☆55Updated 4 years ago
- Deep scan domain and find all possible domain to takeover☆17Updated 2 years ago
- A simple Ransomware Generator☆52Updated last year
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆28Updated last month
- DursGo - The Go-Powered Web Application Scanner - With AI-Powered Analysis☆56Updated 3 weeks ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- Dios sql injection☆22Updated 4 years ago
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆41Updated last year
- ☆194Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆59Updated 3 months ago
- Cyber Security Awareness Framework (CSAF)☆100Updated last week
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆82Updated 2 years ago
- PrivacyNet: Privacy Network☆53Updated last year
- Bug Hunter is a command-line tool designed to assist in the bug hunting process for web applications. It automates several tasks such as …☆123Updated 2 months ago
- A powerful and delightful PHP WebShell☆66Updated 10 months ago
- Domain Availability Checker☆174Updated 5 months ago
- This Python script allows you to generate Nessus Professional Keys directly without having to fill out the registration form. It simplifi…☆109Updated last year
- 🔮 Python Remote administration tool via telegram☆55Updated 8 months ago
- 「🔎」CORS vulnerability scanner☆12Updated last year
- Backdoor PHP shell script.☆84Updated last year
- NemesisTools PowerFull Hacking Tools☆53Updated last year