Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/justinbeatz/Stockpile
The router hacking repo.
https://github.com/justinbeatz/Stockpile
Last synced: about 1 month ago
JSON representation
The router hacking repo.
- Host: GitHub
- URL: https://github.com/justinbeatz/Stockpile
- Owner: justinbeatz
- Created: 2015-08-10T20:17:50.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2015-08-09T22:12:15.000Z (over 9 years ago)
- Last Synced: 2024-08-03T01:25:04.738Z (4 months ago)
- Size: 57.6 KB
- Stars: 33
- Watchers: 6
- Forks: 17
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-rainmana - justinbeatz/Stockpile - The router hacking repo. (Others)
README
#Stockpile
The router hacking repo.- [Tweet](https://twitter.com/share)
#Papers:
- [JTAG Slides](http://www.devttys0.com/wp-content/uploads/2014/04/JTAG_Slides.pdf)
- [How to hack millions of routers](https://media.blackhat.com/bh-us-10/presentations/Heffner/BlackHat-USA-2010-Heffner-How-to-Hack-Millions-of-Routers-slides.pdf)
- [Hacking cisco routers](http://repo.hackerzvoice.net/depot_cehv6/CEHv6%20Module%2035%20Hacking%20Routers,%20Cable%20Modems%20and%20Firewalls/Hacking%20Cisco%20Routers.pdf)
- [Router Exploitation](https://www.blackhat.com/presentations/bh-usa-09/LINDNER/BHUSA09-Lindner-RouterExploit-SLIDES.pdf)
- [From SQLi to MIPS Overflows](https://media.blackhat.com/bh-us-12/Briefings/Cutlip/BH_US_12_Cutlip_SQL_Exploitation_WP.pdf)
- [Flashing & Attacking WiFi Routers](http://hackmiami.org/wp-content/uploads/2013/07/Flash-hacking-wifi-devices.pdf)
- [SANS: Exploiting embedded devices](https://www.sans.org/reading-room/whitepapers/testing/exploiting-embedded-devices-34022)
- [Hacking routers for fun and profit](https://ensiwiki.ensimag.fr/images/2/25/GreHack-2012-talk-Paul_Amar-Home_Internet_Routers_for_Fun_and_Profit.pdf)
- [Remote Attacks Against SOHO Routers](https://media.blackhat.com/bh-us-10/whitepapers/Heffner/BlackHat-USA-2010-Heffner-How-to-Hack-Millions-of-Routers-wp.pdf)
- [Developing MIPS Exploits to Hack Routers](https://packetstormsecurity.com/files/download/131556/hacking-mips.pdf)
- [Exploiting Buffer Overflow Using the MIPS ISA](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.15.6998&rep=rep1&type=pdf)
- [Exploiting ADSL routers to perform cyber attacks!](http://cgi.di.uoa.gr/~xenakis/Published/Technical_Reports/ZTExploit_Paper.pdf)
- [Owning the Network: Adventures in Router Rootkits](https://www.defcon.org/images/defcon-20/dc-20-presentations/Coppola/DEFCON-20-Coppola-Owning-the-Network.pdf)#Documentation:
- [Hacking the Linksys WMB54G](http://www.devttys0.com/2012/07/hacking-the-linksys-wmb54g/)
- [Hacking the D-Link DIR-890L](http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/)
- [Cracking Linksys “Encryption”](http://www.devttys0.com/2014/02/cracking-linksys-crypto/)
- [WRT120N fprintf Stack Overflow](http://www.devttys0.com/2014/02/wrt120n-fprintf-stack-overflow/)
- [Breaking SSL on Embedded Devices](http://www.devttys0.com/2010/12/breaking-ssl-on-embedded-devices/)
- [Reverse Engineering Serial Ports](http://www.devttys0.com/2012/11/reverse-engineering-serial-ports/)
- [Exploiting a MIPS Stack Overflow](http://www.devttys0.com/2012/10/exploiting-a-mips-stack-overflow/)
- [What the Ridiculous Fuck, D-Link?!](http://www.devttys0.com/2015/04/what-the-ridiculous-fuck-d-link/)
- [Reversing Belkin’s WPS Pin Algorithm](http://www.devttys0.com/2015/04/reversing-belkins-wps-pin-algorithm/)
- [Exploiting Embedded Systems – Part 1](http://www.devttys0.com/2011/09/exploiting-embedded-systems-part-1/)
- [Exploiting Embedded Systems – Part 2](http://www.devttys0.com/2011/09/exploiting-embedded-systems-part-2/)
- [Exploiting Embedded Systems – Part 3](http://www.devttys0.com/2011/09/exploiting-embedded-systems-part-3/)
- [Exploiting Embedded Systems – Part 4](http://www.devttys0.com/2011/11/exploiting-embedded-systems-part-4/)
- [Reversing D-Link’s WPS Pin Algorithm](http://www.devttys0.com/2014/10/reversing-d-links-wps-pin-algorithm/)
- [Reverse Engineering a D-Link Backdoor](http://www.devttys0.com/2013/10/reverse-engineering-a-d-link-backdoor/)
- [reverse engineer router firmware part 1](http://www.secforce.com/blog/2014/04/reverse-engineer-router-firmware-part-1/)
- [reverse engineer router firmware part 2](http://www.secforce.com/blog/2014/07/reverse-engineer-router-firmware-part-2/)
- [Extracting Non-Standard SquashFS Images](http://www.devttys0.com/2011/08/extracting-non-standard-squashfs-images/)
- [How to exploit home routers for anonymity](http://danmcinerney.org/how-to-exploit-home-routers-for-anonymity/)
- [Re-enabling JTAG and Debugging the WRT120N](http://www.devttys0.com/2014/02/re-enabling-jtag-and-debugging-the-wrt120n/)
- [Reversing the WRT120N’s Firmware Obfuscation](http://www.devttys0.com/2014/02/reversing-the-wrt120n-firmware-obfuscation/)
- [Reverse Engineering Firmware: Linksys WAG120N](http://www.devttys0.com/2011/05/reverse-engineering-firmware-linksys-wag120n/)#Videos:
- [Router Exploitation](https://www.youtube.com/watch?v=u1IA9W-QWO4)
- [Hacking `Redacted` Routers](https://www.youtube.com/watch?v=U8fu05Em3Lg)
- [How to Hack Millions of Routers ](https://www.youtube.com/watch?v=FV7SQd-3Ytk)
- [Owning the Network: Adventures in Router Rootkits](https://www.youtube.com/watch?v=sWdqSG9IydA)
- [Attacks Against 2wire Residential Gateway Routers](https://www.youtube.com/watch?v=Tx0DivWaDkA)#Exploits:
- [NETGEAR ReadyNAS LAN /dbbroker 6.2.4 - Credential Disclosure(2015)](https://www.exploit-db.com/exploits/37720/)
- [D-Link DSP-W w110 v1.05b01 - Multiple Vulnerabilities(2015)](https://www.exploit-db.com/exploits/37454/)
- [Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Disclosure(2015)](https://www.exploit-db.com/exploits/37424/)
- [Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Change Vulnerability(2015)](https://www.exploit-db.com/exploits/37425/)
- [Dlink DSL-2750u and DSL-2730u - Authenticated Local File Disclosure(2015)](https://www.exploit-db.com/exploits/37516/)
- [D-Link DSL-500B Gen 2 - (URL Filter Configuration Panel) Stored XSS(2015)](https://www.exploit-db.com/exploits/36988/)
- [D-Link DSL-500B Gen 2 - (Parental Control Configuration Panel) Stored XSS(2015)](https://www.exploit-db.com/exploits/36987/)
- [ZTE ZXHN H108L - Authentication Bypass](https://www.exploit-db.com/exploits/35272/)
- [D-Link DSL-2730B Modem - XSS Injection Stored Exploit Lancfg2get.cgi](https://www.exploit-db.com/exploits/35751/)
- [D-Link DSL-2730B Modem - XSS Injection Stored Exploit Wlsecrefresh.wl & Wlsecurity.wl(2015)](https://www.exploit-db.com/exploits/35747/)
- [D-Link DSL-2730B Modem - XSS Injection Stored Exploit DnsProxy.cmd](https://www.exploit-db.com/exploits/35750/)
- [D-Link Cookie Command Execution(2015)](https://www.exploit-db.com/exploits/37628/)
- [D-Link Devices HNAP SOAPAction-Header Command Execution(2015)](https://www.exploit-db.com/exploits/37171/)
- [15 TOTOLINK Router Models - Multiple RCE Vulnerabilities(2015)](https://www.exploit-db.com/exploits/37623/)
- [TP-LINK WR842ND Remote Multiple SSID Directory Travesal Exploit(2013)](https://www.exploit-db.com/exploits/25810/)
- [ZyXEL Router P-660HN-T1A - Login Bypass(2014)](https://www.exploit-db.com/exploits/32204/)
- [D-Link DSR Router Series - Remote Root Shell Exploit(2013)](https://www.exploit-db.com/exploits/30062/)
- [D-Link DSL-2740B (ADSL Router) Authentication Bypass(2013)](https://www.exploit-db.com/exploits/24563/)
- [Mikrotik RouterOS sshd (ROSSSH) - Remote Preauth Heap Corruption(2013)](https://www.exploit-db.com/exploits/28056/)
- [D-Link info.cgi POST Request Buffer Overflow](https://www.exploit-db.com/exploits/34063/)
- [D-Link HNAP Request Remote Buffer Overflow](https://www.exploit-db.com/exploits/34064/)
- [D-Link hedwig.cgi Buffer Overflow in Cookie Header](https://www.exploit-db.com/exploits/33863/)
- [D-Link authentication.cgi Buffer Overflow](https://www.exploit-db.com/exploits/33862/)
- [D-Link Unauthenticated UPnP M-SEARCH Multicast Command Injection](https://www.exploit-db.com/exploits/34065/)
- [SAP Router - Timing Attack Password Disclosure(2014)](https://www.exploit-db.com/exploits/32919/)
- [Sercomm TCP/32674 Backdoor Reactivation](https://www.exploit-db.com/exploits/32938/)#Tools:
- [rext](https://github.com/j91321/rext)
- [rpef](https://github.com/mncoppola/rpef)
- [rebind](https://github.com/ScarletBlazin/rebind)
- [binwalk](https://github.com/devttys0/binwalk)
- [wrt120n](https://github.com/devttys0/wrt120n)
- [baudrate](https://github.com/devttys0/baudrate)
- [libmpsse](https://github.com/devttys0/libmpsse)
- [asus-cmd](https://github.com/jduck/asus-cmd)
- [Crippled](https://github.com/GuerrillaWarfare/Crippled)
- [Profiteer](https://github.com/GuerrillaWarfare/Profiteer)
- [TCP-32764](https://github.com/elvanderb/TCP-32764)
- [sasquatch](https://github.com/devttys0/sasquatch)
- [littleblackbox](https://github.com/devttys0/littleblackbox)
- [firmware-mod-kit](https://github.com/mirror/firmware-mod-kit)#Websites:
- [Routerpwn](http://www.routerpwn.com/)
- [Router security](http://routersecurity.org/bugs.php)#Donations:
- 17vorVqtJqbDaN6ZC6UGE7UwGC4QVmDNMh