vulnersCom / mikrot8overLinks
mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4
☆113Updated 4 years ago
Alternatives and similar repositories for mikrot8over
Users that are interested in mikrot8over are comparing it to the libraries listed below
Sorting:
- A shell script that automatically performs a series of *NIX enumeration tasks.☆40Updated 4 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆63Updated 3 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆60Updated 4 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- "PRinter Exploitation Toolkit" LAN automation tool☆209Updated 5 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆72Updated last year
- Kal El Network Stress Test and Penetration Testing Toolkit☆56Updated last year
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆17Updated 7 years ago
- Automate Metasploit scanning and exploitation☆116Updated last month
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆101Updated 5 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 4 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 6 years ago
- Routopsy - Hacking Routers with Routers☆177Updated 4 years ago
- DNS Enumeration with Asynchronicity☆45Updated 6 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- Unicode encoding attacks with machine learning☆97Updated 3 years ago
- ☆30Updated 5 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- Offensive Security recon tool☆92Updated 4 years ago
- Simple Karma Attack☆69Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆75Updated 2 years ago
- Operational Security utility and automator.☆137Updated 5 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 5 years ago
- ☆17Updated 5 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago