Skip to main content

Exploitation Framework for Embedded Devices

Project description

# RouterSploit - Exploitation Framework for Embedded Devices

[![Python 3.6](https://img.shields.io/badge/Python-3.6-yellow.svg)](http://www.python.org/download/) [![Build Status](https://travis-ci.org/threat9/routersploit.svg?branch=master)](https://travis-ci.org/threat9/routersploit)

The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.

[![asciicast](https://asciinema.org/a/180370.png)](https://asciinema.org/a/180370)

It consists of various modules that aid penetration testing operations:

  • exploits - modules that take advantage of identified vulnerabilities

  • creds - modules designed to test credentials against network services

  • scanners - modules that check if a target is vulnerable to any exploit

  • payloads - modules that are responsible for generating payloads for various architectures and injection points

  • generic - modules that perform generic attacks

# Installation

## Requirements

Required: * future * requests * paramiko * pysnmp * pycrypto

Optional: * bluepy - Bluetooth low energy

## Installation on Kali Linux

` apt-get install python3-pip git clone https://www.github.com/threat9/routersploit cd routersploit python3 -m pip install -r requirements.txt python3 rsf.py `

Bluetooth Low Energy support: ` apt-get install libglib2.0-dev python3 -m pip install bluepy python3 rsf.py `

## Installation on Ubuntu 20.04

` sudo apt-get install git python3-pip git clone https://github.com/threat9/routersploit cd routersploit python3 -m pip install -r requirements.txt python3 rsf.py `

Bluetooth Low Energy support:

` sudo apt-get install libglib2.0-dev python3 -m pip install bluepy python3 rsf.py `

## Installation on Ubuntu 18.04 & 17.10

` sudo add-apt-repository universe sudo apt-get install git python3-pip git clone https://www.github.com/threat9/routersploit cd routersploit python3 -m pip install setuptools python3 -m pip install -r requirements.txt python3 rsf.py `

Bluetooth Low Energy support: ` apt-get install libglib2.0-dev python3 -m pip install bluepy python3 rsf.py `

## Installation on OSX

` git clone https://www.github.com/threat9/routersploit cd routersploit sudo python3 -m pip install -r requirements.txt python3 rsf.py `

## Running on Docker

` git clone https://www.github.com/threat9/routersploit cd routersploit docker build -t routersploit . docker run -it --rm routersploit `

# Update

Update RouterSploit Framework often. The project is under heavy development and new modules are shipped almost every day.

` cd routersploit git pull `

# Build your own To our surprise, people started to fork [routersploit](https://github.com/threat9/routersploit) not because they were interested in the security of embedded devices but simply because they want to leverage our interactive shell logic and build their tools using similar concept. All these years they must have said: _”There must be a better way!”_ and they were completely right, the better way is called [_Riposte_](https://github.com/fwkz/riposte).

[_Riposte_](https://github.com/fwkz/riposte) allows you to easily wrap your application inside a tailored interactive shell. Common chores regarding building REPLs was factored out and being taken care of so you can focus on specific domain logic of your application. # License

The RouterSploit Framework is under a BSD license. Please see [LICENSE](LICENSE) for more details.

# Acknowledgments * [riposte](https://github.com/fwkz/riposte)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

routersploit-3.4.4.tar.gz (476.9 kB view details)

Uploaded Source

File details

Details for the file routersploit-3.4.4.tar.gz.

File metadata

  • Download URL: routersploit-3.4.4.tar.gz
  • Upload date:
  • Size: 476.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.0.0 CPython/3.9.6

File hashes

Hashes for routersploit-3.4.4.tar.gz
Algorithm Hash digest
SHA256 95ab5c0783fd13acde7c2f3bc8dcf8da641132316ef1302f6c01acd8291965ec
MD5 3d2e7e4dc65f9bc6d1fab4012ca9c621
BLAKE2b-256 8259e1c02ec86381c5f06a75da7a03a2c2a5f7dd3e35fa047094b6ae3a2b1e0a

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page