- 19 May, 2024 5 commits
-
-
lucyoa authored
-
lucyoa authored
-
Marcin Bury authored
-
Update Linksys password disclosure to support base64 encoded .htaccess files, as used by EA6900 version 1.1.42.161129 (#744)
Chris Stahly authored -
* Better detection of vulnerable router * Update eseries_themoon_rce.py --------- Co-authored-by: Eshwar Sai Jalagam <bobby@Bobby-PC>
Eshwar Sai Jalagam authored
-
- 14 Apr, 2024 3 commits
-
-
lucyoa authored
-
This module exploits password reset feature on some TP-Link Archer routers by leveraging a predictable random number generator seed. For more details, see this write-up: https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html Based on PoC by William Bowling.
Vadim Yanitskiy authored -
Co-authored-by: Merlyn Albery-Speyer <merlyn@newrelic.com>
curious-attempt-bunny authored
-
- 10 Apr, 2024 4 commits
-
-
Marcin Bury authored
-
Marcin Bury authored
-
jose nazario authored
-
Marcin Bury authored
-
- 09 Apr, 2024 3 commits
-
-
Marcin Bury authored
-
Please note Pierre also references this post for this vulnerability, and the other source also references this blogpost. I plan to contribute more to this project, with more meaningful PRs.
zh4ck authored -
Anuj Koli authored
-
- 03 Apr, 2024 3 commits
-
-
Correct the spelling of "vulnerabilities"
Jay Turla authored -
azdralovic authored
-
Bumps [requests](https://github.com/psf/requests) from 2.21.0 to 2.31.0. - [Release notes](https://github.com/psf/requests/releases) - [Changelog](https://github.com/psf/requests/blob/main/HISTORY.md) - [Commits](https://github.com/psf/requests/compare/v2.21.0...v2.31.0) --- updated-dependencies: - dependency-name: requests dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
dependabot[bot] authored
-
- 25 Sep, 2022 2 commits
-
-
Rakibul Yeasin authored
-
Co-authored-by: Damian Jude Mascarenhas <67428121+kooldamian28@users.noreply.github.com>
Marcin Bury authored
-
- 06 Feb, 2021 3 commits
-
-
Kleo Bercero authored
-
There is a small typo in routersploit/modules/exploits/routers/zte/f460_f660_backdoor.py. Should read `vulnerability` rather than `vulnerabilty`.
Tim Gates authored -
Karthikeyan Singaravelan authored
-
- 12 Jun, 2020 2 commits
-
-
Marcin Bury authored
-
Marcin Bury authored
-
- 10 Jun, 2020 1 commit
-
-
Mariusz Kupidura authored
-
- 09 Jun, 2020 1 commit
-
-
Marcin Bury authored
-
- 15 Dec, 2019 1 commit
-
-
big_J authored
-
- 12 Nov, 2019 2 commits
- 09 Sep, 2019 1 commit
-
-
* added telstra pass * Update passwords.txt
sp4rticus authored
-
- 31 Aug, 2019 3 commits
-
-
* Fixing wordlist creds parsing * Pinning requests package because of URL normalization in new version
Marcin Bury authored -
* Update defaults.txt removed duplicate line with erroneous colon. * Update defaults.txt * Deleted erroneous colon from data set. An erroneous colon was causing a unpacking error. Removed the line of data. Resolves issue 604.
Justin authored -
Marcin Bury authored
-
- 13 Jul, 2019 1 commit
-
-
fwkz authored
-
- 04 May, 2019 2 commits
-
-
Marcin Bury authored
-
* add advanced options to scanners, and so modules in order to restrict tests and reduce network impact * avoid committing Pipfile * correct help which was not working anymore * enhance search capabilities * enhance search with existing options based on current modules * remove display test * simplify the non interactive execution process * correct lint errors * correct lint errors * correct OptEncoder error, missing advanced parameter
Ben Mz authored
-
- 18 Apr, 2019 1 commit
-
-
Marcin Bury authored
-
- 15 Apr, 2019 1 commit
-
-
* Add jovision credential disclosure exploit * Fix username and password fields being mixed up * Document jovision credentials disclosure
David Paskevic authored
-
- 11 Apr, 2019 1 commit
-
-
* Introduce a RESOURCE_DIR to avoid relative hardcoded paths - Introduce a RESOURCES_DIR similar to other *_DIR - Add a resources_directory parameter to lookup_vendor() to avoid possible hardcoded directory and - if not provided - pick up the default RESOURCES_DIR. * Avoid possible hardcoded relative paths and use RESOURCE_DIR instead (Otherwise ssh_keys are tried to picked up in in ${PWD} (and mostly likely failing)) * Avoid hardcoded relative paths and use MODULES_DIR instead Commit id 9380c047 (probably accidentally) removed EXPLOITS_DIR use leading to loading routersploit/modules/exploits relative to the current directory instead of the installed ones in MODULES_DIR. * Avoid hardcoded relative paths and use utils.index_modules() instead * Avoid hardcoded relative paths and use utils.index_modules() instead * G/C no longer used import/functions * G/C no longer used module import * Reintroduce encode and fix a copypasto * Add missing `.' Spotted by @lucyoa, thanks! * Fix a regression on the semantic/name of payloads payloads should be listed/selected as `<architecture>/<payload>', not `payloads.<architecture>.<payload>'. Thanks to @lucyoa!
Leonardo Taccari authored
-