diff --git a/routersploit/modules/creds/http_basic_bruteforce.py b/routersploit/modules/creds/http_basic_bruteforce.py
index bf5ef8c..f003f5b 100644
--- a/routersploit/modules/creds/http_basic_bruteforce.py
+++ b/routersploit/modules/creds/http_basic_bruteforce.py
@@ -43,7 +43,7 @@ class Exploit(exploits.Exploit):
         url = sanitize_url("{}:{}{}".format(self.target, self.port, self.path))
 
         try:
-            r = requests.get(url)
+            r = requests.get(url, verify=False)
         except (requests.exceptions.MissingSchema, requests.exceptions.InvalidSchema):
             print_error("Invalid URL format: %s" % url)
             return
@@ -88,7 +88,7 @@ class Exploit(exploits.Exploit):
                 user, password = data.next()
                 user = user.encode('utf-8').strip()
                 password = password.encode('utf-8').strip()
-                r = requests.get(url, auth=(user, password))
+                r = requests.get(url, auth=(user, password), verify=False)
 
                 if r.status_code != 401:
                     running.clear()
diff --git a/routersploit/modules/creds/http_basic_default.py b/routersploit/modules/creds/http_basic_default.py
index 032aa8b..7ab843a 100644
--- a/routersploit/modules/creds/http_basic_default.py
+++ b/routersploit/modules/creds/http_basic_default.py
@@ -40,7 +40,7 @@ class Exploit(exploits.Exploit):
         url = sanitize_url("{}:{}{}".format(self.target, self.port, self.path))
 
         try:
-            r = requests.get(url)
+            r = requests.get(url, verify=False)
         except (requests.exceptions.MissingSchema, requests.exceptions.InvalidSchema):
             print_error("Invalid URL format: %s" % url)
             return
@@ -79,7 +79,7 @@ class Exploit(exploits.Exploit):
                 line = data.next().split(":")
                 user = line[0].encode('utf-8').strip()
                 password = line[1].encode('utf-8').strip()
-                r = requests.get(url, auth=(user, password))
+                r = requests.get(url, auth=(user, password), verify=False)
 
                 if r.status_code != 401:
                     running.clear()
diff --git a/routersploit/modules/creds/http_form_bruteforce.py b/routersploit/modules/creds/http_form_bruteforce.py
index 985920d..a58e49e 100644
--- a/routersploit/modules/creds/http_form_bruteforce.py
+++ b/routersploit/modules/creds/http_form_bruteforce.py
@@ -46,7 +46,7 @@ class Exploit(exploits.Exploit):
         url = sanitize_url("{}:{}{}".format(self.target, self.port, self.path))
 
         try:
-            requests.get(url)
+            requests.get(url, verify=False)
         except (requests.exceptions.MissingSchema, requests.exceptions.InvalidSchema):
             print_error("Invalid URL format: %s" % url)
             return
@@ -99,7 +99,7 @@ class Exploit(exploits.Exploit):
             password = "A" * i
 
             postdata = self.data.replace("{{USER}}", user).replace("{{PASS}}", password)
-            r = requests.post(url, headers=headers, data=postdata)
+            r = requests.post(url, headers=headers, data=postdata, verify=False)
             l = len(r.text)
 
             if i == 0:
@@ -112,7 +112,7 @@ class Exploit(exploits.Exploit):
 
     def detect_form(self):
         url = sanitize_url("{}:{}{}".format(self.target, self.port, self.path))
-        r = requests.get(url)
+        r = requests.get(url, verify=False)
         soup = BeautifulSoup(r.text, "lxml")
 
         form = soup.find("form")
@@ -150,7 +150,7 @@ class Exploit(exploits.Exploit):
                 password = password.strip()
 
                 postdata = self.data.replace("{{USER}}", user).replace("{{PASS}}", password)
-                r = requests.post(url, headers=headers, data=postdata)
+                r = requests.post(url, headers=headers, data=postdata, verify=False)
                 l = len(r.text)
 
                 if l < self.invalid["min"] or l > self.invalid["max"]:
diff --git a/routersploit/modules/creds/http_form_default.py b/routersploit/modules/creds/http_form_default.py
index 9adb403..abca1f9 100644
--- a/routersploit/modules/creds/http_form_default.py
+++ b/routersploit/modules/creds/http_form_default.py
@@ -44,7 +44,7 @@ class Exploit(exploits.Exploit):
         url = sanitize_url("{}:{}{}".format(self.target, self.port, self.path))
 
         try:
-            requests.get(url)
+            requests.get(url, verify=False)
         except (requests.exceptions.MissingSchema, requests.exceptions.InvalidSchema):
             print_error("Invalid URL format: %s" % url)
             return
@@ -92,7 +92,7 @@ class Exploit(exploits.Exploit):
             password = "A" * i
 
             postdata = self.data.replace("{{USER}}", user).replace("{{PASS}}", password)
-            r = requests.post(url, headers=headers, data=postdata)
+            r = requests.post(url, headers=headers, data=postdata, verify=False)
             l = len(r.text)
 
             if i == 0:
@@ -105,7 +105,7 @@ class Exploit(exploits.Exploit):
 
     def detect_form(self):
         url = sanitize_url("{}:{}{}".format(self.target, self.port, self.path))
-        r = requests.get(url)
+        r = requests.get(url, verify=False)
         soup = BeautifulSoup(r.text, "lxml")
 
         form = soup.find("form")
@@ -143,7 +143,7 @@ class Exploit(exploits.Exploit):
                 password = line[1].strip()
 
                 postdata = self.data.replace("{{USER}}", user).replace("{{PASS}}", password)
-                r = requests.post(url, headers=headers, data=postdata)
+                r = requests.post(url, headers=headers, data=postdata, verify=False)
                 l = len(r.text)
 
                 if l < self.invalid["min"] or l > self.invalid["max"]: