tenable / routerosLinks
RouterOS Security Research Tooling and Proof of Concepts
☆890Updated 2 years ago
Alternatives and similar repositories for routeros
Users that are interested in routeros are comparing it to the libraries listed below
Sorting:
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆660Updated 3 years ago
- Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)☆517Updated 4 years ago
- Tools for Mikrotik devices☆563Updated 5 years ago
- Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.☆747Updated 2 years ago
- Proof of Concepts☆1,266Updated 10 months ago
- IPv6 attack toolkit☆1,123Updated last week
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆485Updated 8 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆803Updated 3 years ago
- Proof of concept for CVE-2019-0708☆1,181Updated 3 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆851Updated 5 months ago
- Proofs-of-concept☆811Updated last year
- A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.☆911Updated 6 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,263Updated 3 years ago
- Proof of Concept of Winbox Critical Vulnerability☆218Updated 6 years ago
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆328Updated 6 years ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆443Updated 4 months ago
- Various kernel exploits☆793Updated last year
- Various binaries for the mips architecture.☆322Updated last year
- Attify OS - Distro for pentesting IoT devices☆1,005Updated 4 years ago
- Toolbox for HPE iLO4 & iLO5 analysis☆431Updated last year
- [Linux] Two Privilege Escalation techniques abusing sudo token☆720Updated 6 years ago
- ☆1,359Updated 5 years ago
- Script for searching the extracted firmware file system for goodies!☆1,162Updated 2 years ago
- Raw-packet Project☆231Updated 5 years ago
- Simple reverse ICMP shell☆1,604Updated 7 years ago
- Tiny SHell - An open-source UNIX backdoor (I'm not the author!)☆617Updated 4 months ago
- dump☆495Updated 6 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,074Updated 3 years ago
- A collection of statically compiled tools like Nmap and Socat.☆457Updated last year
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,492Updated last year