tenable / routerosLinks
RouterOS Security Research Tooling and Proof of Concepts
☆883Updated 2 years ago
Alternatives and similar repositories for routeros
Users that are interested in routeros are comparing it to the libraries listed below
Sorting:
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆658Updated 2 years ago
- Tools for Mikrotik devices☆552Updated 5 years ago
- Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)☆515Updated 4 years ago
- A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.☆908Updated 5 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,257Updated 2 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆468Updated 8 years ago
- Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.☆740Updated 2 years ago
- Proof of Concept of Winbox Critical Vulnerability☆216Updated 5 years ago
- Smart Install Exploitation Tool☆581Updated 3 years ago
- Various binaries for the mips architecture.☆308Updated 8 months ago
- IPv6 attack toolkit☆1,085Updated 3 months ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆330Updated 6 years ago
- Scan and Export RouterOS Password☆150Updated 6 years ago
- Proof of concept for CVE-2019-0708☆1,185Updated 3 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,423Updated 2 years ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 4 years ago
- ☆369Updated 2 years ago
- Proof of Concepts☆1,259Updated 6 months ago
- DHCP exhaustion script written in python using scapy network library