Command line Mikrotik exploitation tool for RouterOS up to 6.38.4
Project description
mikrot8over
=========
Command line Mikrotik exploitation tool.
It's using Mikrotik exploit from Vault 7 CIA Leaks automation tool
Takeovers up to RouterOS 6.38.4.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
mikrot8over-1.1.tar.gz
(4.0 kB
view hashes)
Built Distributions
Close
Hashes for mikrot8over-1.1-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | da0726cd65f16def1edd3454463429e5e78a0038e63986d42c50616b05aa3308 |
|
MD5 | fa71f0086aab0a875470f643418bb21e |
|
BLAKE2b-256 | 2914d3c94fc272b5ade15d5ef5f6bcb63d716d87df6fc168ad4d721edf252ce0 |
Close
Hashes for mikrot8over-1.1-py2-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 0a7974029175456a231030336180f8a2466e66700c1d317d254211270db2428d |
|
MD5 | 519c4e36b9ae74c8ef95f470a1428914 |
|
BLAKE2b-256 | 55c1f6ad07e1b8f7b547185f6a5e7b6c05841c5a16c61106ceed8463671844c6 |