Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
☆79Jun 11, 2018Updated 7 years ago
Alternatives and similar repositories for Chimay-Red
Users that are interested in Chimay-Red are comparing it to the libraries listed below
Sorting:
- This is a minified exploit for mikrotik routers. It does not require any aditional modules to run.☆28Oct 4, 2018Updated 7 years ago
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆662Sep 20, 2022Updated 3 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Oct 8, 2018Updated 7 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆118Sep 29, 2024Updated last year
- CVE-2018-3191 反弹shell☆63Oct 23, 2018Updated 7 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21May 11, 2017Updated 8 years ago
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- Scan and Export RouterOS Password☆161Aug 24, 2018Updated 7 years ago
- An offensive attack framework for Distributed Layer of Modern Applications☆85Feb 5, 2020Updated 6 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 7 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- RouterOS (Mikrotik) Backup over SSH☆19Feb 17, 2014Updated 12 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- softScheck Cloud Fuzzing Framework☆58Jan 26, 2018Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- Tools used for Penetration testing / Red Teaming☆66Dec 4, 2018Updated 7 years ago
- Monitoring Registry and File Changes in Windows☆69Jan 14, 2026Updated last month
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- A binary rainfall visualizer for packet captures. Idea taken from Greg Conti's "Security Data Visualization".☆13Nov 5, 2020Updated 5 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Jun 6, 2024Updated last year
- ☆45Jul 18, 2016Updated 9 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- The python client of 360 Netlab whois database☆14Dec 5, 2018Updated 7 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- ☆13Dec 30, 2018Updated 7 years ago
- burp extender for fuzzing☆10Aug 10, 2018Updated 7 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago