seekintoo / Chimay-RedLinks
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
☆79Updated 7 years ago
Alternatives and similar repositories for Chimay-Red
Users that are interested in Chimay-Red are comparing it to the libraries listed below
Sorting:
- Mikrotik SMB buffer overflow exploit☆65Updated 7 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆115Updated 11 months ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- ☆73Updated 6 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 8 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 6 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 7 years ago
- Some useful tools and scripts☆46Updated 2 years ago
- Find infected ms17-010 machines☆14Updated 8 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆54Updated 7 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆107Updated 5 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 7 years ago
- ☆47Updated 9 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆59Updated 2 years ago