vulnersCom / mikrot8overLinks
mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4
☆113Updated 4 years ago
Alternatives and similar repositories for mikrot8over
Users that are interested in mikrot8over are comparing it to the libraries listed below
Sorting:
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆60Updated 4 years ago
- 0day-mikrotik is a security tool designed to identify and exploit vulnerabilities in MikroTik routers, enabling security researchers to a…☆112Updated 8 months ago
- A shell script that automatically performs a series of *NIX enumeration tasks.☆40Updated 4 years ago
- Automated Tools Pentest☆7Updated 2 years ago
- An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)☆63Updated 3 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆56Updated last year
- Automate Metasploit scanning and exploitation☆115Updated 8 months ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- Python based script for Information Gathering.☆105Updated last year
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.☆77Updated 7 years ago
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆17Updated 7 years ago
- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.☆331Updated 4 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Updated 5 years ago
- ☆43Updated last year
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- RouterOS security testing tools☆84Updated 5 years ago
- Search engine scraper tool with BASH script.☆84Updated 5 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆121Updated 5 years ago
- Program to perform vulnerability analysis and automatically generate a report☆56Updated 2 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- Offensive Security recon tool☆92Updated 3 years ago
- A wrapper for Nmap to quickly run network scans☆147Updated 4 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆208Updated 5 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆71Updated 2 years ago
- An epic web shell☆84Updated 2 weeks ago
- a parser + crawler for .DS_Store files exposed publically☆55Updated 2 years ago
- Create a screenshot of a remote desktop because NLA is disabled.☆39Updated 3 years ago