This module exploits password reset feature on some TP-Link Archer routers by leveraging a predictable random number generator seed. For more details, see this write-up: https://devcraft.io/posts/2017/07/21/tp-link-archer-c9-admin-password-reset.html Based on PoC by William Bowling.
Name |
Last commit
|
Last update |
---|---|---|
.github | Loading commit data... | |
.travis | Loading commit data... | |
docs/modules | Loading commit data... | |
routersploit | Loading commit data... | |
tests | Loading commit data... | |
.dockerignore | Loading commit data... | |
.gitignore | Loading commit data... | |
.travis.yml | Loading commit data... | |
CONTRIBUTING.md | Loading commit data... | |
Dockerfile | Loading commit data... | |
LICENSE | Loading commit data... | |
MANIFEST.in | Loading commit data... | |
Makefile | Loading commit data... | |
README.md | Loading commit data... | |
requirements-dev.txt | Loading commit data... | |
requirements.txt | Loading commit data... | |
rsf.py | Loading commit data... | |
setup.py | Loading commit data... |