Tool and Usage
|Author||Marcin Bury, Mariusz Kupidura|
|Latest release||3.4.0 |
Why this tool?
RouterSploit is a framework to exploit embedded devices such as cameras and routers. It can be used during penetration testing to test the security of a wide variety of devices. RouterSploit comes with several modules to scan and exploit the devices. The tool helps in all steps, like from credential testing to deploying a payload to perform an exploitation attempt.
How it works
RouterSploit can be started to perform a scan on a particular device. The tool determines if it is vulnerable to a known exploit from its database. It uses the related service ports to make an estimated guess of what payloads could be relevant.
Usage and audience
RouterSploit is commonly used for penetration testing, self-assessment, software testing, or vulnerability scanning. Target users for this tool are pentesters and security professionals.
- Colored output
- Command line interface
- Customization and additions are possible
- Docker support
- Tool is modular
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + More than 50 contributors
- + More than 6000 GitHub stars
- + The source code of this software is available
History and highlights
- Demo at Black Hat USA 2018 Arsenal
Supported operating systems
RouterSploit is known to work on Linux and macOS.
Several dependencies are required to use RouterSploit.
Similar tools to RouterSploit:
Expliot is a framework to perform security testing of IoT infrastructure and IoT devices. Read how it works in this review.
Metasploit is a framework that consists of tools to perform security assignments. It focuses on the offensive side of security and leverages exploit modules.
0d1n is a security tool to perform fuzzing of web applications and discover potential security issues. It is commonly used during security assignments.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
This tool is categorized as a IoT security tools.