RouterSploit
๐ฅ Exploitation ยท Python
RouterSploit is an open-source exploitation framework specifically designed for attacking embedded devices such as routers, access points, NAS appliances, and IoT hardware. Modeled after Metasploit's architecture, it provides a familiar console interface with modules for exploits, credential attacks, and vulnerability scanning tailored to the unique attack surfaces of embedded systems. Penetration testers and red team operators use RouterSploit to identify and exploit known vulnerabilities in network infrastructure that traditional vulnerability scanners often overlook. The framework includes a credential brute-forcing module with default password dictionaries for hundreds of device vendors, making it particularly effective for auditing network perimeters where consumer and enterprise embedded devices are deployed.
Tags
Details
- Category
- ๐ฅ Exploitation
- Language
- Python
- Repository
- threat9/routersploit
- Platforms
- ๐งlinux๐macos
Links
Community Reviews
No reviews yet. Be the first to review RouterSploit.
More in Exploitation
Metasploit Framework
RubyThe world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
BloodHound
GoActive Directory attack path mapping. Visualizes privilege escalation paths using graph theory.
Impacket
PythonCollection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
CrackMapExec
PythonSwiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Evil-WinRM
RubyUltimate WinRM shell for pentesting. Upload/download, in-memory PowerShell, DLL injection, pass-the-hash.
Covenant
C#.NET C2 framework. Collaborative, web-based interface for red team operations and implant management.