Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices.
The Routersploit contains various modules that perform penetration testing operations
exploits – modules that take advantage of identified vulnerabilities
creds – modules designed to test credentials against network services
scanners – modules that check if a target is vulnerable to any exploit
payloads – modules that are responsible for generating payloads for various architectures and injection points
generic – modules that perform generic attacks
To install Routersploit it requires the following modules to be present in the system
future
requests
paramiko
pysnmp
pycrypto
bluepy – Bluetooth low energy
Also Read Blind-Bash: Project To Obfuscate Your Bash Code
apt-get install python3-pip git clone https://www.github.com/threat9/routersploit cd routersploit python3 -m pip install -r requirements.txt python3 rsf.py
apt-get install libglib2.0-dev python3 -m pip install bluepy python3 rsf.py
sudo add-apt-repository universe sudo apt-get install git python3-pip git clone https://www.github.com/threat9/routersploit cd routersploit python3 -m pip install -r requirements.txt python3 rsf.py
apt-get install libglib2.0-dev python3 -m pip install bluepy python3 rsf.py
git clone https://www.github.com/threat9/routersploit cd routersploit sudo python3 -m pip install -r requirements.txt python3 rsf.py
git clone https://www.github.com/threat9/routersploit cd routersploit docker build -t routersploit docker run -it --rm routersploit
cd routersploit git pull
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…