vulnersCom / mikrot8overLinks
mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4
☆113Updated 4 years ago
Alternatives and similar repositories for mikrot8over
Users that are interested in mikrot8over are comparing it to the libraries listed below
Sorting:
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆60Updated 4 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆63Updated 3 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆111Updated 8 months ago
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆17Updated 7 years ago
- A shell script that automatically performs a series of *NIX enumeration tasks.☆40Updated 4 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 4 years ago
- Mikrotik SMB buffer overflow exploit☆64Updated 7 years ago
- Automated Tools Pentest☆7Updated 2 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.☆77Updated 6 years ago
- An epic web shell☆84Updated 4 months ago
- Decentralized DNS fuzzer to mitigate ISP Snooping☆12Updated 8 years ago
- Simple Karma Attack☆69Updated 4 years ago
- Automate Metasploit scanning and exploitation☆115Updated 8 months ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆56Updated last year
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆84Updated 7 years ago
- Offensive Security recon tool☆92Updated 3 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆171Updated 3 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆208Updated 5 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆71Updated 2 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Automated Pentest Tools Designed For Parrot Linux☆86Updated 6 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check☆25Updated 4 years ago
- Airodump-ng WiFi Scan Visualizer☆59Updated 7 years ago
- Common password pattern generator using strings list☆132Updated 4 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago