syrex1013 / MikroRootLinks
Automated version of CVE-2018-14847 (MikroTik Exploit)
☆15Updated 7 months ago
Alternatives and similar repositories for MikroRoot
Users that are interested in MikroRoot are comparing it to the libraries listed below
Sorting:
- Multithreaded drupalgeddon2 scanner☆12Updated 7 years ago
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Updated 11 years ago
- ☆19Updated 8 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.☆79Updated 7 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24Updated 7 years ago
- SWF Vulnerability & Information Scanner☆18Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆47Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Updated 6 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆118Updated last year
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Updated 7 years ago
- Vulnerability Scanner☆11Updated 11 years ago
- :.IP webcam penetration test suit.:☆24Updated 6 years ago
- A tool for recover router password☆33Updated 7 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆32Updated 6 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Updated 4 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆24Updated 8 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last month
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Updated 4 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Enumerates users based off RDP Screenshots☆35Updated 2 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Updated 6 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Updated 10 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Updated 7 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Updated 2 years ago