syrex1013 / MikroRootLinks
Automated version of CVE-2018-14847 (MikroTik Exploit)
☆15Updated 7 months ago
Alternatives and similar repositories for MikroRoot
Users that are interested in MikroRoot are comparing it to the libraries listed below
Sorting:
- Multithreaded drupalgeddon2 scanner☆12Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- ☆19Updated 8 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Updated 4 years ago
- SWF Vulnerability & Information Scanner☆18Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Updated 6 years ago
- :.IP webcam penetration test suit.:☆24Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24Updated 7 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated 2 months ago
- A tool for recover router password☆33Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Updated 7 years ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Updated 11 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Updated 6 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Updated 7 years ago
- Exploiting cameras with a very distinctive HTTP Server header of "JAWS/1.0".☆10Updated 3 years ago
- ☆13Updated 6 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆118Updated last year
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Updated 4 years ago
- So many shells in so little time☆10Updated 6 years ago
- ☆17Updated 6 years ago
- when i started web application security testing, i fall in love with web shell development and designed some PHP based web shells. This r…☆62Updated 7 years ago
- Open-source Exploiting Framework☆31Updated 8 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Updated 5 years ago
- A Linux RAT in C☆33Updated 7 years ago
- Automated Google dorking with custom search engines☆26Updated 5 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆32Updated 6 years ago
- Web application backdoor builder☆76Updated 4 years ago