{"id":2271,"date":"2018-08-15T22:17:15","date_gmt":"2018-08-15T16:47:15","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=2271"},"modified":"2018-08-15T22:17:15","modified_gmt":"2018-08-15T16:47:15","slug":"routersploit-exploitation-framework","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/","title":{"rendered":"RouterSploit &#8211; Exploitation Framework For Embedded Devices"},"content":{"rendered":"<p><strong>Routersploit<\/strong> is an open-source exploitation Framework to perform various penetration testing operations with embedded devices.<\/p>\n<p>The Routersploit contains various modules that perform penetration testing operations<\/p>\n<p><strong>exploits<\/strong> &#8211; modules that take advantage of identified vulnerabilities<br \/>\n<strong>creds<\/strong> &#8211; modules designed to test credentials against network services<br \/>\n<strong>scanners<\/strong> &#8211; modules that check if a target is vulnerable to any exploit<br \/>\n<strong>payloads<\/strong> &#8211; modules that are responsible for generating payloads for various architectures and injection points<br \/>\n<strong>generic<\/strong> &#8211; modules that perform generic attacks<\/p>\n<h2><strong>Installation &#8211; Routersploit<\/strong><\/h2>\n<p>To install Routersploit it requires the following modules to be present in the system<\/p>\n<p>future<br \/>\nrequests<br \/>\nparamiko<br \/>\npysnmp<br \/>\npycrypto<\/p>\n<h5><strong>Optional<\/strong><\/h5>\n<p>bluepy &#8211; Bluetooth low energy<\/p>\n<p><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span>\u00a0<a href=\"https:\/\/kalilinuxtutorials.com\/blind-bash-obfuscate-bash-code\/\" target=\"_blank\" rel=\"noopener\">Blind-Bash: Project To Obfuscate Your Bash Code<\/a><\/strong><\/p>\n<h2><strong>Installation on Kali Linux<\/strong><\/h2>\n<pre>apt-get install python3-pip\ngit clone https:\/\/www.github.com\/threat9\/routersploit\ncd routersploit\npython3 -m pip install -r requirements.txt\npython3 rsf.py<\/pre>\n<h4><strong>Bluetooth Low Energy support:<\/strong><\/h4>\n<pre>apt-get install libglib2.0-dev\npython3 -m pip install bluepy\npython3 rsf.py<\/pre>\n<h2><strong>Installation on Ubuntu 18.04 &amp; 17.10<\/strong><\/h2>\n<pre>sudo add-apt-repository universe\nsudo apt-get install git python3-pip\ngit clone https:\/\/www.github.com\/threat9\/routersploit\ncd routersploit\npython3 -m pip install -r requirements.txt\npython3 rsf.py<\/pre>\n<h4><strong>Bluetooth Low Energy support:<\/strong><\/h4>\n<pre>apt-get install libglib2.0-dev\npython3 -m pip install bluepy\npython3 rsf.py<\/pre>\n<h2><strong>Installation on OSX<\/strong><\/h2>\n<pre>git clone https:\/\/www.github.com\/threat9\/routersploit\ncd routersploit\nsudo python3 -m pip install -r requirements.txt\npython3 rsf.py<\/pre>\n<h2><strong>Running on Docker<\/strong><\/h2>\n<pre>git clone https:\/\/www.github.com\/threat9\/routersploit\ncd routersploit\ndocker build -t routersploit\ndocker run -it --rm routersploit<\/pre>\n<h2><strong>To Update Routersploit<\/strong><\/h2>\n<pre><strong>cd routersploit<\/strong>\n<strong>git pull<\/strong><\/pre>\n<p><a href=\"https:\/\/github.com\/threat9\/routersploit#installation-on-osx\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-999 size-full\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" alt=\"Routersploit\" width=\"141\" height=\"40\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules that perform penetration testing operations exploits &#8211; modules that take advantage of identified vulnerabilities creds &#8211; modules designed to test credentials against network services scanners &#8211; modules that check if a target is vulnerable to [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[2891],"class_list":["post-2271","post","type-post","status-publish","format-standard","hentry","category-kali","tag-routersploit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RouterSploit - Exploitation Framework For Embedded Devices - Kali Linux Tutorials<\/title>\n<meta name=\"description\" content=\"Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RouterSploit - Exploitation Framework For Embedded Devices - Kali Linux Tutorials\" \/>\n<meta property=\"og:description\" content=\"Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-15T16:47:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" \/>\n<meta name=\"author\" content=\"Linumonk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linumonk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/\"},\"author\":{\"name\":\"Linumonk\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/07a328e13dd83dc735e3351313fd6839\"},\"headline\":\"RouterSploit &#8211; Exploitation Framework For Embedded Devices\",\"datePublished\":\"2018-08-15T16:47:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/\"},\"wordCount\":148,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"keywords\":[\"RouterSploit\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/\",\"name\":\"RouterSploit - Exploitation Framework For Embedded Devices - Kali Linux Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"datePublished\":\"2018-08-15T16:47:15+00:00\",\"description\":\"Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/07a328e13dd83dc735e3351313fd6839\",\"name\":\"Linumonk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/11fc05739c32fb9f21e1b9361f9944dd6cf2802d0e10c8b4b89fa6fccc993ffe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/11fc05739c32fb9f21e1b9361f9944dd6cf2802d0e10c8b4b89fa6fccc993ffe?s=96&d=mm&r=g\",\"caption\":\"Linumonk\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/gurubaran\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RouterSploit - Exploitation Framework For Embedded Devices - Kali Linux Tutorials","description":"Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/","og_locale":"en_US","og_type":"article","og_title":"RouterSploit - Exploitation Framework For Embedded Devices - Kali Linux Tutorials","og_description":"Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices.","og_url":"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-08-15T16:47:15+00:00","og_image":[{"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","type":"","width":"","height":""}],"author":"Linumonk","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Linumonk","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/"},"author":{"name":"Linumonk","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/07a328e13dd83dc735e3351313fd6839"},"headline":"RouterSploit &#8211; Exploitation Framework For Embedded Devices","datePublished":"2018-08-15T16:47:15+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/"},"wordCount":148,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","keywords":["RouterSploit"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/","url":"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/","name":"RouterSploit - Exploitation Framework For Embedded Devices - Kali Linux Tutorials","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","datePublished":"2018-08-15T16:47:15+00:00","description":"Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/routersploit-exploitation-framework\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/07a328e13dd83dc735e3351313fd6839","name":"Linumonk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11fc05739c32fb9f21e1b9361f9944dd6cf2802d0e10c8b4b89fa6fccc993ffe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11fc05739c32fb9f21e1b9361f9944dd6cf2802d0e10c8b4b89fa6fccc993ffe?s=96&d=mm&r=g","caption":"Linumonk"},"url":"https:\/\/kalilinuxtutorials.com\/author\/gurubaran\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1397,"url":"https:\/\/kalilinuxtutorials.com\/wmd-weapon-mass-destruction\/","url_meta":{"origin":2271,"position":0},"title":"WMD &#8211; Weapon of Mass Destruction","author":"R K","date":"May 25, 2018","format":false,"excerpt":"WMD is a python tool with an accumulation of IT security software. The product is incapsulated in \"modules\". The modules consists of unadulterated python code and or external third programs. Main functions Of WMD To use a module, run the command \"use [module_call]\", e.g. \"use apsniff\", to activate the module.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/WMD.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/WMD.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/WMD.png?resize=525%2C300 1.5x"},"classes":[]},{"id":32450,"url":"https:\/\/kalilinuxtutorials.com\/awesome-embedded-and-iot-security\/","url_meta":{"origin":2271,"position":1},"title":"Awesome Embedded And IoT Security &#8211; Key Tools And Insights","author":"Varshini","date":"March 25, 2024","format":false,"excerpt":"Botnets like\u00a0Mirai\u00a0have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic. If you are a beginner, you should have a look at the\u00a0Books\u00a0and\u00a0Case Studies\u00a0sections. If you want to start right away\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":4550,"url":"https:\/\/kalilinuxtutorials.com\/industrial-control-system\/","url_meta":{"origin":2271,"position":2},"title":"ISF : Industrial Control System Exploitation Framework","author":"R K","date":"April 11, 2019","format":false,"excerpt":"ISF(Industrial Control System Exploitation Framework)\uff0ca exploitation framework based on Python. Industrial Control System is based on open source project routersploit. ICS Protocol Clients NamePathDescriptionmodbus_tcp_clienticssploit\/clients\/modbus_tcp_client.pyModbus-TCP Clientwdb2_clienticssploit\/clients\/wdb2_client.pyWdbRPC Version 2 Client(Vxworks 6.x)s7_clienticssploit\/clients\/s7_client.pys7comm Client(S7 300\/400 PLC) Also Read - Darksplitz : Exploit Framework Exploit Module NamePathDescriptions7_300_400_plc_controlexploits\/plcs\/siemens\/s7_300_400_plc_control.pyS7-300\/400 PLC start\/stops7_1200_plc_controlexploits\/plcs\/siemens\/s7_1200_plc_control.pyS7-1200 PLC start\/stop\/resetvxworks_rpc_dosexploits\/plcs\/vxworks\/vxworks_rpc_dos.pyVxworks RPC remote dos\uff08CVE-2015-7599\uff09quantum_140_plc_controlexploits\/plcs\/schneider\/quantum_140_plc_control.pySchneider Quantum\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":35055,"url":"https:\/\/kalilinuxtutorials.com\/metasploit-for-penetration-testing\/","url_meta":{"origin":2271,"position":3},"title":"Metasploit for Penetration Testing and Exploitation &#8211; 2024","author":"Rajashekar Yasani","date":"August 7, 2024","format":false,"excerpt":"Metasploit is a powerful and widely used framework for penetration testing and exploitation. It provides security professionals with tools to discover vulnerabilities, exploit them, and assess the security posture of systems. This guide will walk you through the installation process, working methods, and provide examples of how to use Metasploit\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":2277,"url":"https:\/\/kalilinuxtutorials.com\/raptor-waf-web-application-firewall\/","url_meta":{"origin":2271,"position":4},"title":"Raptor WAF &#8211; Web application firewall using DFA","author":"R K","date":"August 16, 2018","format":false,"excerpt":"Raptor\u00a0WAF\u00a0is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting and way traversal. It is widely use now a days for the following; Block XSS, SQL injection attacks and path traversal with Raptor. Use blacklist IPs to block some users\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"PoC version","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/help.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/help.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/help.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/help.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5569,"url":"https:\/\/kalilinuxtutorials.com\/ptf-pentesters-framework\/","url_meta":{"origin":2271,"position":5},"title":"PTF : A Way For Modular Support For Up-To-Date Tools","author":"R K","date":"July 1, 2019","format":false,"excerpt":"PTF( PenTesters Framework) is a Python script designed for Debian\/Ubuntu\/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. As pentesters, we've been accustom to the \/pentest\/ directories or our own toolsets that we want to keep up-to-date all of the time. We have those \"go to\"\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/2271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=2271"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/2271\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=2271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=2271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=2271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}