tenable / routeros
RouterOS Security Research Tooling and Proof of Concepts
☆882Updated 2 years ago
Alternatives and similar repositories for routeros
Users that are interested in routeros are comparing it to the libraries listed below
Sorting:
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆656Updated 2 years ago
- Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)☆515Updated 4 years ago
- Tools for Mikrotik devices☆550Updated 5 years ago
- Proof of Concept of Winbox Critical Vulnerability☆216Updated 5 years ago
- Raw-packet Project☆227Updated 4 years ago
- Various binaries for the mips architecture.☆307Updated 8 months ago
- Smart Install Exploitation Tool☆580Updated 3 years ago
- A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.☆907Updated 5 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆796Updated 3 years ago
- Proof of concept for CVE-2019-0708☆1,184Updated 3 years ago
- Proofs-of-concept☆792Updated 8 months ago
- mXtract - Memory Extractor & Analyzer☆591Updated 3 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- Proof of Concepts☆1,255Updated 6 months ago
- IPv6 attack toolkit☆1,080Updated 3 months ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆714Updated 6 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆410Updated 5 years ago
- Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.☆737Updated 2 years ago
- Scan and Export RouterOS Password☆150Updated 6 years ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 4 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,421Updated 2 years ago
- Mikrotik SMB buffer overflow exploit☆64Updated 7 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,068Updated 3 years ago
- Modified hostapd to facilitate AP impersonation attacks☆507Updated 6 years ago
- Vulnerability Labs for security analysis☆1,171Updated 4 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆781Updated last year
- Simple reverse ICMP shell☆1,585Updated 7 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆111Updated 7 months ago
- Script for searching the extracted firmware file system for goodies!☆1,117Updated last year
- Some of my exploits.☆581Updated 4 years ago