routersploit
Exploitation tool
An exploitation framework designed to aid in the testing of embedded devices' vulnerabilities
Exploitation Framework for Embedded Devices
12k stars
619 watching
2k forks
Language: Python
last commit: 4 months ago
Linked from 2 awesome lists
bruteforcecredsdictionary-attackembeddedexploitsinfosecpythonrouterrouter-exploitation-frameworkroutersploitroutersploit-frameworkscannersecurity
Related projects:
Repository | Description | Stars |
---|---|---|
| A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment | 10,698 |
| A collection of Python libraries and tools for network exploitation and reverse engineering. | 2,725 |
| A Python-based framework for conducting man-in-the-middle attacks and rogue access point exploits on wireless networks. | 2,016 |
| A post-exploitation and adversary emulation framework used to aid Red Teams and Penetration Testers in testing and simulating complex attacks. | 4,297 |
| Automates exploiting vulnerabilities in web applications to execute arbitrary actions on their behalf | 3,027 |
| A Python script designed to simplify the installation and management of penetration testing tools on Linux distributions. | 5,179 |
| Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. | 35 |
| A toolkit for rapid prototyping and exploit development in CTF challenges | 12,204 |
| A tool for conducting red team Wi-Fi security testing by creating fake wireless networks and exploiting client associations. | 13,388 |
| Automated tool for identifying vulnerabilities and gathering information about network services and systems. | 3,700 |
| Detects and analyzes malicious traffic patterns to identify potential security threats. | 6,642 |
| A toolkit for reconnaissance and attack on various network types and devices | 16,919 |
| A toolkit designed to test and exploit Cross-Site Request Forgery vulnerabilities in websites. | 1,116 |
| An educational platform showcasing 14 different types of vulnerabilities in ARM/AARCH64 applications through CTF-style exploitation tutorials. | 897 |
| Exploits a known vulnerability in the PlayStation 4 to execute arbitrary code | 2,633 |