Routersploit

Exploitation Framework for Embedded Devices
Alternatives To Routersploit
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Routersploit10,982
8 months ago98otherPython
Exploitation Framework for Embedded Devices
Hacker Roadmap10,653
9 months ago3mit
A collection of hacking tools, resources and references to practice ethical hacking.
Beef8,428
11 days ago83JavaScript
The Browser Exploitation Framework Project
Nuclei Templates6,318
6 hours ago174mit
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Awesome Hacker Search Engines5,215
4 days ago2mitShell
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Yakit5,126
2 days ago203agpl-3.0TypeScript
Cyber Security ALL-IN-ONE Platform
Poc In Github5,007
4 hours ago9
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
Cve4,970
10 hours ago8mitHTML
Gather and update all available and newest CVEs with their PoC.
Autosploit4,749
2 years ago43gpl-3.0Python
Automated Mass Exploiter
Linux Kernel Exploitation4,741
7 days agocc-by-4.0
A collection of links related to Linux kernel security and exploitation
Alternatives To Routersploit
Select To Compare


Alternative Project Comparisons
Readme

RouterSploit - Exploitation Framework for Embedded Devices

Python 3.6 Build Status

The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.

asciicast

It consists of various modules that aid penetration testing operations:

  • exploits - modules that take advantage of identified vulnerabilities
  • creds - modules designed to test credentials against network services
  • scanners - modules that check if a target is vulnerable to any exploit
  • payloads - modules that are responsible for generating payloads for various architectures and injection points
  • generic - modules that perform generic attacks

Installation

Requirements

Required:

  • future
  • requests
  • paramiko
  • pysnmp
  • pycrypto

Optional:

  • bluepy - Bluetooth low energy

Installation on Kali Linux

apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py

Bluetooth Low Energy support:

apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py

Installation on Ubuntu 20.04

sudo apt-get install git python3-pip
git clone https://github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py

Bluetooth Low Energy support:

sudo apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py

Installation on Ubuntu 18.04 & 17.10

sudo add-apt-repository universe
sudo apt-get install git python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install setuptools
python3 -m pip install -r requirements.txt
python3 rsf.py

Bluetooth Low Energy support:

apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py

Installation on OSX

git clone https://www.github.com/threat9/routersploit
cd routersploit
sudo python3 -m pip install -r requirements.txt
python3 rsf.py

Running on Docker

git clone https://www.github.com/threat9/routersploit
cd routersploit
docker build -t routersploit .
docker run -it --rm routersploit

Update

Update RouterSploit Framework often. The project is under heavy development and new modules are shipped almost every day.

cd routersploit
git pull

Build your own

To our surprise, people started to fork routersploit not because they were interested in the security of embedded devices but simply because they want to leverage our interactive shell logic and build their tools using similar concept. All these years they must have said: "There must be a better way!" and they were completely right, the better way is called Riposte.

Riposte allows you to easily wrap your application inside a tailored interactive shell. Common chores regarding building REPLs was factored out and being taken care of so you can focus on specific domain logic of your application.

License

The RouterSploit Framework is under a BSD license. Please see LICENSE for more details.

Acknowledgments

Popular Exploitation Projects
Popular Security Projects
Popular Security Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Python
Security
Scanner
Router
Exploitation
Brute Force
Information Security
Dictionary Attack