tenable / routerosLinks
RouterOS Security Research Tooling and Proof of Concepts
☆895Updated 3 years ago
Alternatives and similar repositories for routeros
Users that are interested in routeros are comparing it to the libraries listed below
Sorting:
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆662Updated 3 years ago
- Tools for Mikrotik devices☆572Updated 5 years ago
- Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)☆521Updated 5 years ago
- Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.☆767Updated 2 years ago
- ☆377Updated 2 years ago
- IPv6 attack toolkit☆1,140Updated 2 months ago
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆327Updated 6 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆849Updated 7 months ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆482Updated 9 years ago
- Proof of Concepts☆1,317Updated last year
- Various binaries for the mips architecture.☆329Updated last year
- Vulnerability checker for Callstranger (CVE-2020-12695)☆402Updated 4 years ago
- Toolkit to emulate firmware and analyse it for security vulnerabilities☆1,517Updated last year
- Proof of Concept of Winbox Critical Vulnerability☆220Updated 6 years ago
- Attify OS - Distro for pentesting IoT devices☆1,012Updated 4 years ago
- Raw-packet Project☆233Updated 5 years ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆449Updated 3 weeks ago
- Script for searching the extracted firmware file system for goodies!☆1,177Updated 2 years ago
- Proofs-of-concept☆817Updated last year
- Various kernel exploits☆800Updated last year
- Proof of concept for CVE-2019-0708☆1,184Updated 4 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- DNS-Shell is an interactive Shell over DNS channel☆527Updated 5 years ago
- Some of my exploits.☆594Updated 4 years ago
- A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.☆918Updated 6 years ago
- Toolbox for HPE iLO4 & iLO5 analysis☆435Updated last year
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆336Updated 6 years ago
- Simple reverse ICMP shell☆1,612Updated 7 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆679Updated 6 years ago