Quantcast
Channel: Exploits – Security List Network™
Viewing all articles
Browse latest Browse all 514

Updates REXT v0.0 – Router Exploitation Toolkit.

$
0
0

Latest Changelog 23/12/2015:
– requirements.txt : requests==2.9.1 from requests==2.5.1
– Added default host value to Exploit.py
– exploit module: Dlink DIR-300 and DIR-600 exec noauth.

Router Exploitation Toolkit – REXT is a Small toolkit for easy creation and usage of various python scripts that work with embedded devices.

Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.

Router EXploitation Toolkit – small toolkit for easy creation and usage of various python scripts that work with embedded devices.

– core – contains most of toolkits basic functions
– databases – contains databases, like default credentials etc.
– interface – contains code that is being used for the creation and manipulation with interface
– modules – contains structure of modules, that can be loaded, every module contains vendor specific sub-modules where scripts are stored.
– decryptors
– exploits
– harvesters
– misc
– scanners
– output – output goes here
This is still heavy work-in progress

Requirements:
+ Python 3, request v2.9.1

Installation and Usage:

git clone https://github.com/j91321/rext
cd <your clone folder>
pip3 install -r requirements.txt
python3 rext.py

Update : update or
cd rext
git pull
pip3 install -r requirements.txt
and run again 
python3 rext.py

Download : rext-master.zip(46KB)  | Clone Url 
Source : https://github.com/j91321    | Our Post Before


Viewing all articles
Browse latest Browse all 514

Latest Images

Trending Articles



Latest Images