Router-Exploit-Shovel: An Automated Application Generator For Stack Overflow Types On Wireless Routers

About Router-Exploit-Shovel
   Router-Exploit-Shovel is an automated application generation for Stack Overflow types on Wireless Routers.

   Router exploits shovel is an automated application generation tool for stack overflow types on wireless routers. The tool implements the key functions of exploits, it can adapt to the length of the data padding on the stack, generate the ROP chain, generate the encoded shellcode, and finally assemble them into a complete attack code. The user only needs to attach the attack code to the overflow location of the POC to complete the Exploit of the remote code execution.

   The tool supports MIPSel and MIPSeb.Run on Ubuntu 16.04 64bit.

Router-Exploit-Shovel's Installation
   Open your Terminal and enter these commands:
Usage

   Example: python3 Router_Exploit_Shovel.py -b test_binaries/mipseb-httpd -l test_binaries/libuClibc-0.9.30.so -o 0x00478584

Router-Exploit-Shovel's screenshot

Code structure

ROP chain generation
   This tool uses pattern to generate ROP chains. Extract patterns from common ROP exploitation procedure. Use regex matching to find available gadgets to fill up chain strings. Base64 encoding is to avoid duplicate character escapes. For example:

Attackblocks
   You can get attackblocks generated in results/attackBlocks.txt. Such as:

You might like these similar tools:

Read more


  1. Hacking Tools Windows 10
  2. Hacker Tools Apk Download
  3. Tools For Hacker
  4. Hacker Tools Apk
  5. Hack Tools For Games
  6. Pentest Tools For Ubuntu
  7. How To Hack
  8. Pentest Recon Tools
  9. Hacking Tools For Beginners
  10. Pentest Tools Online
  11. Pentest Tools Alternative
  12. Install Pentest Tools Ubuntu
  13. Nsa Hacker Tools
  14. Hacking Tools Download
  15. Pentest Box Tools Download
  16. Hacking Tools Windows 10
  17. Hacking Tools Name
  18. Hack Tools
  19. Hacker Tools Windows
  20. Pentest Tools Alternative
  21. Hacking Tools Download

No comments:

Post a Comment

Blog Archive