tenable / routeros
RouterOS Security Research Tooling and Proof of Concepts
☆881Updated 2 years ago
Alternatives and similar repositories for routeros:
Users that are interested in routeros are comparing it to the libraries listed below
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆656Updated 2 years ago
- Tools for Mikrotik devices☆550Updated 5 years ago
- Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)☆513Updated 4 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆796Updated 2 years ago
- Proof of Concepts☆1,248Updated 4 months ago
- Proof of Concept of Winbox Critical Vulnerability☆216Updated 5 years ago
- Linux 4.10 < 5.1.17 PTRACE_TRACEME local root☆329Updated 5 years ago
- A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.☆904Updated 5 years ago
- Scan and Export RouterOS Password☆150Updated 6 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,315Updated 4 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆466Updated 8 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆833Updated 3 months ago
- Simple reverse ICMP shell☆1,573Updated 6 years ago
- IPv6 attack toolkit☆1,074Updated last month
- Toolbox for HPE iLO4 & iLO5 analysis☆424Updated last year
- Script for searching the extracted firmware file system for goodies!☆1,108Updated last year
- Various binaries for the mips architecture.☆302Updated 6 months ago
- Smart Install Exploitation Tool☆575Updated 3 years ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,247Updated 2 years ago
- Proofs-of-concept☆785Updated 6 months ago
- Raw-packet Project☆226Updated 4 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCE☆677Updated 4 years ago
- Mikrotik's NPK files managing tools☆77Updated 4 years ago
- SensePost's modified hostapd for wifi attacks.☆562Updated 7 months ago
- 🕳 godoh - A DNS-over-HTTPS C2☆774Updated last year
- The best way to scan for weak ssh passwords on your network☆609Updated last year
- Various kernel exploits☆773Updated last year
- [Linux] Two Privilege Escalation techniques abusing sudo token☆711Updated 5 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.☆735Updated 2 years ago