Automated version of CVE-2018-14847 (MikroTik Exploit)
☆15Jun 12, 2025Updated 8 months ago
Alternatives and similar repositories for MikroRoot
Users that are interested in MikroRoot are comparing it to the libraries listed below
Sorting:
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- ☆13Dec 30, 2018Updated 7 years ago
- Python tool to brute force MikroTik login page☆14Oct 31, 2025Updated 4 months ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Nov 17, 2020Updated 5 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script☆20Sep 30, 2019Updated 6 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4☆110Oct 7, 2020Updated 5 years ago
- ☆10Feb 22, 2023Updated 3 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 8 months ago
- Automated Enumeration Script for Pentesting☆34Aug 14, 2020Updated 5 years ago
- Samsung Galaxy A52s 5G (a52sxq) TWRP Device Tree.☆12Jan 27, 2024Updated 2 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Yet another PHP Obfuscator☆33Jan 28, 2026Updated last month
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- Dump elasticsearch instance☆15Jan 7, 2026Updated last month
- Gojira is a record and replay framework for Java apps meant for regression testing. It provides complete recording capability within a si…☆13Feb 5, 2025Updated last year
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- • The first blockchain records both the consensus protocol and transaction data on chain. • Built multi fiat-based stable coins, e.g. EUR…☆12Nov 14, 2018Updated 7 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- 👤 🗑 Deletes users that did not log in in the last days.☆10Updated this week
- Fathimah bot Telegram support plugins.☆13Aug 19, 2017Updated 8 years ago
- Project that was done as part of the OOP course during my second year in college.☆11Oct 18, 2015Updated 10 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Discord Scripts☆12Nov 30, 2019Updated 6 years ago
- Run x509lint from a PostgreSQL function☆11Apr 3, 2020Updated 5 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- ☆16Aug 17, 2025Updated 6 months ago
- Javascript SDK for MathWallet☆11Dec 14, 2020Updated 5 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- This is an amazing tool using which you can download all tools for termux.☆39Sep 12, 2022Updated 3 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- Template Responsive for Mikrotik Hostpot Page☆12Oct 26, 2018Updated 7 years ago