mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4
☆110Oct 7, 2020Updated 5 years ago
Alternatives and similar repositories for mikrot8over
Users that are interested in mikrot8over are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- A WPA3 dictionary cracker☆356Jul 10, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Mar 21, 2026Updated 2 weeks ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Python script to automatically login to MikroTik Proxy server☆16Feb 9, 2021Updated 5 years ago
- WRecon is an open source no intussive web scanner. It is designed to discover all URL in a website recursively, without using bruteforce …☆19Oct 23, 2020Updated 5 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆87Jun 27, 2020Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- Auto connect and reconnect to Mikrotik free WiFi point on DD-WRT router☆12Dec 2, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Automated version of CVE-2018-14847 (MikroTik Exploit)☆15Jun 12, 2025Updated 9 months ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Apr 24, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Scan and Export RouterOS Password☆162Aug 24, 2018Updated 7 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- Fast offline auditing of Active Directory passwords using Python.☆166Aug 14, 2024Updated last year
- Botnet targeting Windows machines 🐍☆48Feb 25, 2026Updated last month
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆213Jun 23, 2020Updated 5 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 7 months ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Nov 29, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- SubDomain Finder☆13Nov 9, 2021Updated 4 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- Web application recon for bug bounty☆21Apr 19, 2020Updated 5 years ago
- A network scanner tool, developed in Python 3 using scapy.☆137Mar 1, 2026Updated last month