Latest Changelog 23/12/2015:
– requirements.txt : requests==2.9.1 from requests==2.5.1
– Added default host value to Exploit.py
– exploit module: Dlink DIR-300 and DIR-600 exec noauth.
Router Exploitation Toolkit – REXT is a Small toolkit for easy creation and usage of various python scripts that work with embedded devices.

Router EXploitation Toolkit – small toolkit for easy creation and usage of various python scripts that work with embedded devices.
– core – contains most of toolkits basic functions
– databases – contains databases, like default credentials etc.
– interface – contains code that is being used for the creation and manipulation with interface
– modules – contains structure of modules, that can be loaded, every module contains vendor specific sub-modules where scripts are stored.
– decryptors
– exploits
– harvesters
– misc
– scanners
– output – output goes here
This is still heavy work-in progress
Requirements:
+ Python 3, request v2.9.1
Installation and Usage:
git clone https://github.com/j91321/rext cd <your clone folder> pip3 install -r requirements.txt python3 rext.py Update : update or cd rext git pull pip3 install -r requirements.txt and run again python3 rext.py
Download : rext-master.zip(46KB) | Clone Url
Source : https://github.com/j91321 | Our Post Before