Skip to content

Instantly share code, notes, and snippets.

View paralax's full-sized avatar

jose nazario paralax

View GitHub Profile
@paralax
paralax / dlink_dwr_cred.py
Last active September 8, 2022 15:37
D-Link Router Credential Retrieval
@paralax
paralax / dlink_dwr_dir_traversal.py
Created October 18, 2018 20:53
D-Link router Directory Traversal
@paralax
paralax / dlink_dwr_rce.py
Created October 18, 2018 20:52
D-Link router Command Execution
open System
open System.IO
(*
how it works
- computes the Zipfs law letter distribution
- finds all words with 7 distinct letters
- from those it can then generate puzzles by placing the least likely letter in the center
*)
@paralax
paralax / qcenter_rce.py
Last active August 17, 2018 15:03
routersploit module - routersploit/modules/exploits/quap/qcenter_rce.py
import base64
import json
import re
from routersploit.core.exploit import *
from routersploit.core.http.http_client import HTTPClient
class Exploit(HTTPClient):
__info__ = {
"name": "QNAP Q'Center change_passwd Command Execution",
@paralax
paralax / zentrale_ccu2_rce.py
Created August 16, 2018 20:53
routersploit module exploits/misc/homematic/zentrale_ccu2_rce.py
import random
import re
import string
from routersploit.core.exploit import *
from routersploit.core.http.http_client import HTTPClient
class Exploit(HTTPClient):
__info__ = {
"name": "HomeMatic Zentrale CCU2 - RCE",
@paralax
paralax / network_camera_rce.py
Last active March 14, 2023 19:56
routersploit module exploits/cameras/axis/network_camera_rce.py
import random
import re
import string
from routersploit.core.exploit import *
from routersploit.core.http.http_client import HTTPClient
class Exploit(HTTPClient):
__info__ = {
"name": "Axis Network Camera RCE",
@paralax
paralax / 3g_4g_cellular_ethernet_serial_gateway_default_creds.py
Last active August 12, 2019 23:26
routersploit module - Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Default Creds
from routersploit.core.exploit import *
from routersploit.modules.creds.generic.http_basic_digest_default import Exploit as HTTPBasicDigestDefault
class Exploit(HTTPBasicDigestDefault):
__info__ = {
"name": "Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Default Creds - HTTP Auth",
"description": "Module performs dictionary attack against Microhard Systems "
"3G/4G Cellular Ethernet and Serial Gateway web interface. "
"If valid credentials are found, they are displayed to the user.",
@paralax
paralax / dsl_ac_password_reset.py
Created August 14, 2018 18:22
ASUS Router Password Reset - Routersploit module
import random
import string
from routersploit.core.exploit import *
from routersploit.core.http.http_client import HTTPClient
class Exploit(HTTPClient):
__info__ = {
"name": "ASUS Router Password Reset",
"description": "Module exploits remote flaw in ASUS devices to reset the "
@paralax
paralax / aicloud_xxe.py
Created August 14, 2018 18:22
ASUS Router AiCloud XXE - Routersploit module
import random
import string
from routersploit.core.exploit import *
from routersploit.core.http.http_client import HTTPClient
class Exploit(HTTPClient):
__info__ = {
"name": "ASUS Router AiCloud XXE",
"description": "Module exploits remote XXE flaw in ASUS device AiCloud service. "