-
Thanks for the author's work。I don’t know how to use the fuzzer in FirmAE in the process of reproducing the paper.I don’t know how to use the fuzzer in FirmAE in the process of reproducing the paper.
-
So I'm new on github and i wan't these exploit to be added to routersploit framework.
He are the tree exploits link :
https://www.exploit-db.com/exploits/35462/
Sorry For my bad english.
-
## Steps to Reproduce (for bugs)
Taking it from the initial startup of the program to error, here are the steps I've taken.
1. `sudo python3 rsf.py`
2. `use scanners/autopwn`
3. `set target 54.7…
-
Please add exploits for mikrotik routers
-
Hello i am having error after it checks all the vulnerabilities and gets exit automatically and this comes:
Fatal Python error: _enter_buffered_busy: could not acquire lock for at interpreter shutd…
-
[]()[]()https://play.app.goo.gl/?link=https://play.google.com/store/apps/details?id=com.termux
OWScan
Scan your website for vulnerabilities. Find website application vulnerabilities and fingerprint …
-
## Current Behavior
* Crashes when attempting to transfer payload/setting HTTP server (should be vulnerable)
* Same behaviour on Mac OS & Kali Linux
`cmd (MIPSLE Reverse TCP) > run
[*] Using wge…
-
gives my list of factory logins and passwords that I could find on the Internet, including wifi spy cameras supporting RTSP using android lookcampro and hdsmartIPC applications
{
"usernames": [
…
-
When using `autopwn` to find exploits for a DLink camera, `autopwn` will falsely return a long list of default credentials that should work for the camera. None of the credentials actually work.
Wh…
-