The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.

Exploit embedded devices With Kali RouterSploit

It's only fair to share...Digg thisShare on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInFlattr the authorShare on TumblrShare on VKShare on YummlyShare on RedditShare on StumbleUpon

Exploit embedded devices With Kali RouterSploit

Exploit embedded devices With Kali RouterSploit.  An exploit (from the English verb to exploit, meaning “to use something to one’s own advantage”) is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). Such behavior frequently includes things like gaining control of a computer system, allowingprivilege escalation, or a denial-of-service (DoS or related DDoS) attack.

routersploit Package Description

The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. It consists of various modules that aids penetration testing operations:

  • exploits – modules that take advantage of identified vulnerabilities
  • creds – modules designed to test credentials against network services
  • scanners – modules that check if a target is vulnerable to any exploit

Source: https://github.com/reverse-shell/routersploit
RouterSploit Homepage | Kali routersploit Repo

  • Author: Reverse Shell Security
  • License: BSD-3-clause

Tools included in the routersploit package

routersploit – The RouterSploit Framework
It's only fair to share...Digg thisShare on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInFlattr the authorShare on TumblrShare on VKShare on YummlyShare on RedditShare on StumbleUpon
ALSO READ  Build a USB Killer To Take Down Computer