{"id":13464505,"url":"https://github.com/threat9/routersploit","last_synced_at":"2025-05-12T05:22:17.780Z","repository":{"id":37677869,"uuid":"55058317","full_name":"threat9/routersploit","owner":"threat9","description":"Exploitation Framework for Embedded Devices","archived":false,"fork":false,"pushed_at":"2025-04-24T19:31:59.000Z","size":1966,"stargazers_count":12528,"open_issues_count":76,"forks_count":2335,"subscribers_count":618,"default_branch":"master","last_synced_at":"2025-05-11T03:04:47.329Z","etag":null,"topics":["bruteforce","creds","dictionary-attack","embedded","exploits","infosec","python","router","router-exploitation-framework","routersploit","routersploit-framework","scanner","security"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/threat9.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2016-03-30T11:43:12.000Z","updated_at":"2025-05-11T00:42:20.000Z","dependencies_parsed_at":"2022-07-11T02:51:18.735Z","dependency_job_id":"c8e58525-0b9c-4df1-bb4a-b3b9b6e9a102","html_url":"https://github.com/threat9/routersploit","commit_stats":null,"previous_names":["reverse-shell/routersploit"],"tags_count":16,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/threat9%2Froutersploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/threat9%2Froutersploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/threat9%2Froutersploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/threat9%2Froutersploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/threat9","download_url":"https://codeload.github.com/threat9/routersploit/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":253509779,"owners_count":21919588,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bruteforce","creds","dictionary-attack","embedded","exploits","infosec","python","router","router-exploitation-framework","routersploit","routersploit-framework","scanner","security"],"created_at":"2024-07-31T14:00:45.151Z","updated_at":"2025-05-11T03:05:04.914Z","avatar_url":"https://github.com/threat9.png","language":"Python","funding_links":[],"categories":["Tools","Python","Uncategorized","Python (1887)","HarmonyOS","其他_安全与渗透","\u003ca id=\"d55d9dfd081aa2a02e636b97ca1bad0b\"\u003e\u003c/a\u003e物联网(IoT)\u0026\u0026嵌入式设备\u0026\u0026路由器\u0026\u0026交换机\u0026\u0026智能设备\u0026\u0026打印机","Testing Tools","\u003ca id=\"9a20a70f58ea7946f24224c5d73fac15\"\u003e\u003c/a\u003e工具","security","ابزارهای امنیتی","Software Tools"],"sub_categories":["IoT","Uncategorized","Windows Manager","网络服务_其他","\u003ca id=\"3d345feb9fee1c101aea3838da8cbaca\"\u003e\u003c/a\u003e嵌入式设备","Firmware Analysis and Exploit Frameworks","Hardware Tools","کار با زمان و تقویم","Analysis Frameworks"],"readme":"# RouterSploit - Exploitation Framework for Embedded Devices\n\n[![Python 3.6](https://img.shields.io/badge/Python-3.6-yellow.svg)](http://www.python.org/download/)\n[![Build Status](https://travis-ci.org/threat9/routersploit.svg?branch=master)](https://travis-ci.org/threat9/routersploit)\n\n# Community\nJoin community on [Embedded Exploitation Discord](https://discord.gg/UCXARN2vBx).\n\n# Description\nThe RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.\n\n[![asciicast](https://asciinema.org/a/180370.png)](https://asciinema.org/a/180370)\n\nIt consists of various modules that aid penetration testing operations:\n\n* exploits - modules that take advantage of identified vulnerabilities\n* creds - modules designed to test credentials against network services\n* scanners - modules that check if a target is vulnerable to any exploit\n* payloads - modules that are responsible for generating payloads for various architectures and injection points\n* generic - modules that perform generic attacks \n\n# Installation\n\n## Requirements\n\nRequired:\n* requests\n* paramiko\n* pysnmp\n* pycrypto\n\nOptional:\n* bluepy - Bluetooth low energy \n\n## Installation on Kali Linux\n\n```\napt-get install python3-pip\ngit clone https://www.github.com/threat9/routersploit\ncd routersploit\npython3 -m pip install -r requirements.txt\npython3 rsf.py\n```\n\nBluetooth Low Energy support:\n```\napt-get install libglib2.0-dev\npython3 -m pip install bluepy\npython3 rsf.py\n```\n\n## Installation on Ubuntu 20.04\n\n```\nsudo apt-get install git python3-pip\ngit clone https://github.com/threat9/routersploit\ncd routersploit\npython3 -m pip install -r requirements.txt\npython3 rsf.py\n```\n\nBluetooth Low Energy support:\n\n```\nsudo apt-get install libglib2.0-dev\npython3 -m pip install bluepy\npython3 rsf.py\n```\n\n## Installation on Ubuntu 18.04 \u0026 17.10\n\n```\nsudo add-apt-repository universe\nsudo apt-get install git python3-pip\ngit clone https://www.github.com/threat9/routersploit\ncd routersploit\npython3 -m pip install setuptools\npython3 -m pip install -r requirements.txt\npython3 rsf.py\n```\n\nBluetooth Low Energy support:\n```\napt-get install libglib2.0-dev\npython3 -m pip install bluepy\npython3 rsf.py\n```\n\n\n## Installation on OSX\n\n```\ngit clone https://www.github.com/threat9/routersploit\ncd routersploit\nsudo python3 -m pip install -r requirements.txt\npython3 rsf.py\n```\n\n## Running on Docker\n\n```\ngit clone https://www.github.com/threat9/routersploit\ncd routersploit\ndocker compose up --build -d\ndocker attach routersploit\n```\n### To run again without rebuild\n\n```\ndocker start routersploit\ndocker attach routersploit\n```\n\n# Update\n\nUpdate RouterSploit Framework often. The project is under heavy development and new modules are shipped almost every day.\n\n```\ncd routersploit\ngit pull\n```\n\n# Build your own\nTo our surprise, people started to fork \n[routersploit](https://github.com/threat9/routersploit) not because they were \ninterested in the security of embedded devices but simply because they want to \nleverage our interactive shell logic and build their tools using similar \nconcept. All these years they must have said: _\"There must be a better way!\"_ \nand they were completely right, the better way is called \n[_Riposte_](https://github.com/fwkz/riposte).\n\n[_Riposte_](https://github.com/fwkz/riposte) allows you to easily wrap your \napplication inside a tailored interactive shell. Common chores regarding \nbuilding REPLs was factored out and being taken care of so you can \nfocus on specific domain logic of your application.\n# License\n\nThe RouterSploit Framework is under a BSD license.\nPlease see [LICENSE](LICENSE) for more details.\n\n# Acknowledgments\n* [riposte](https://github.com/fwkz/riposte)\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fthreat9%2Froutersploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fthreat9%2Froutersploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fthreat9%2Froutersploit/lists"}