tenable / routeros
RouterOS Security Research Tooling and Proof of Concepts
☆880Updated 2 years ago
Alternatives and similar repositories for routeros:
Users that are interested in routeros are comparing it to the libraries listed below
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆656Updated 2 years ago
- Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)☆511Updated 4 years ago
- Tools for Mikrotik devices☆549Updated 5 years ago
- Raw-packet Project☆226Updated 4 years ago
- Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.☆733Updated 2 years ago
- A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.☆904Updated 5 years ago
- Proof of concept for CVE-2019-0708☆1,179Updated 3 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- Proof of Concepts☆1,238Updated 4 months ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆834Updated 2 months ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,416Updated 2 years ago
- Smart Install Exploitation Tool☆574Updated 3 years ago
- Script for searching the extracted firmware file system for goodies!☆1,106Updated last year
- ☆1,335Updated 4 years ago
- DNS-Shell is an interactive Shell over DNS channel☆523Updated 4 years ago
- Simple reverse ICMP shell☆1,569Updated 6 years ago
- XFLTReaT tunnelling framework☆327Updated 5 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆323Updated 2 years ago
- Various binaries for the mips architecture.☆304Updated 6 months ago
- ☆362Updated 2 years ago
- My collection of nmap NSE scripts☆965Updated 3 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,311Updated 4 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆797Updated 2 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆744Updated last year
- Mikrotik's NPK files managing tools☆76Updated 4 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆327Updated 6 years ago
- ☆527Updated last year
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆407Updated 5 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆753Updated last year
- Scanner for CVE-2020-0796 - SMBv3 RCE☆676Updated 4 years ago