seekintoo / Chimay-Red
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
☆75Updated 6 years ago
Alternatives and similar repositories for Chimay-Red:
Users that are interested in Chimay-Red are comparing it to the libraries listed below
- Mikrotik SMB buffer overflow exploit☆64Updated 6 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆110Updated 5 months ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- ☆72Updated 5 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆52Updated 6 years ago
- IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]☆35Updated 6 years ago
- Dlink DIR 615 Exploit☆19Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- ☆39Updated 6 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- ☆24Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆51Updated 7 years ago
- ☆57Updated 10 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆62Updated 9 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Advanced Netstat Using Python For Windows☆46Updated 7 years ago