syrex1013 / MikroRootLinks
Automated version of CVE-2018-14847 (MikroTik Exploit)
☆15Updated 6 months ago
Alternatives and similar repositories for MikroRoot
Users that are interested in MikroRoot are comparing it to the libraries listed below
Sorting:
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- A tool for recover router password☆33Updated 7 years ago
- Multithreaded drupalgeddon2 scanner☆12Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- SWF Vulnerability & Information Scanner☆19Updated 7 years ago
- A Linux RAT in C☆33Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- This is a minified exploit for mikrotik routers. It does not require any aditional modules to run.☆27Updated 7 years ago
- ☆19Updated 8 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Updated 4 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last year
- O Scanner vai procurar erros padrões do script SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO. …☆26Updated 11 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24Updated 7 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Updated 5 years ago
- Passwordless RDP Session Hijacking☆68Updated 4 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆32Updated 6 years ago
- :.IP webcam penetration test suit.:☆23Updated 6 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.☆78Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Updated 5 years ago
- So many shells in so little time☆10Updated 6 years ago
- 🔅 Reverse shell written on python3☆14Updated 5 years ago
- Exploiting cameras with a very distinctive HTTP Server header of "JAWS/1.0".☆10Updated 2 years ago
- ☆50Updated 5 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Updated 6 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆117Updated last year
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Updated 7 years ago
- Automated Google dorking with custom search engines☆26Updated 5 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Updated 3 years ago