pkgsrc-WIP-changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

routersploit: Import routersploit-2.2.1 as wip/routersploit



Module Name:	pkgsrc-wip
Committed By:	Leonardo Taccari <leot%NetBSD.org@localhost>
Pushed By:	leot
Date:		Thu Jan 25 17:13:47 2018 +0100
Changeset:	00bfcaca6dd17e52cb7a299e750133bf2dd0682e

Modified Files:
	Makefile
Added Files:
	routersploit/DESCR
	routersploit/Makefile
	routersploit/PLIST
	routersploit/distinfo
	routersploit/files/setup.py

Log Message:
routersploit: Import routersploit-2.2.1 as wip/routersploit

The RouterSploit Framework is an open-source exploitation framework dedicated to
embedded devices.

It consists of various modules that aids penetration testing operations:

 - exploits: modules that take advantage of identified vulnerabilities
 - creds: modules designed to test credentials against network services
 - scanners: modules that check if a target is vulnerable to any exploit

To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=00bfcaca6dd17e52cb7a299e750133bf2dd0682e

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

diffstat:
 Makefile                    |   1 +
 routersploit/DESCR          |   8 +
 routersploit/Makefile       |  27 +++
 routersploit/PLIST          | 403 ++++++++++++++++++++++++++++++++++++++++++++
 routersploit/distinfo       |   6 +
 routersploit/files/setup.py |  20 +++
 6 files changed, 465 insertions(+)

diffs:
diff --git a/Makefile b/Makefile
index b0622e7573..676702ae1a 100644
--- a/Makefile
+++ b/Makefile
@@ -3964,6 +3964,7 @@ SUBDIR+=	rootsh
 SUBDIR+=	rosegarden
 SUBDIR+=	rott
 SUBDIR+=	roundcube-skin-mvision2
+SUBDIR+=	routersploit
 SUBDIR+=	roxterm
 SUBDIR+=	rpcemu
 SUBDIR+=	rpki-git
diff --git a/routersploit/DESCR b/routersploit/DESCR
new file mode 100644
index 0000000000..04efcce8bf
--- /dev/null
+++ b/routersploit/DESCR
@@ -0,0 +1,8 @@
+The RouterSploit Framework is an open-source exploitation framework dedicated to
+embedded devices.
+
+It consists of various modules that aids penetration testing operations:
+
+ - exploits: modules that take advantage of identified vulnerabilities
+ - creds: modules designed to test credentials against network services
+ - scanners: modules that check if a target is vulnerable to any exploit
diff --git a/routersploit/Makefile b/routersploit/Makefile
new file mode 100644
index 0000000000..7c01fda560
--- /dev/null
+++ b/routersploit/Makefile
@@ -0,0 +1,27 @@
+# $NetBSD: Makefile,v 1.4 2017/09/14 12:43:54 leot Exp $
+
+DISTNAME=	routersploit-2.2.1
+CATEGORIES=	security
+MASTER_SITES=	${MASTER_SITE_GITHUB:=reverse-shell/}
+GITHUB_TAG=	v${PKGVERSION_NOREV}
+
+MAINTAINER=	pkgsrc-users%NetBSD.org@localhost
+HOMEPAGE=	https://github.com/reverse-shell/routersploit
+COMMENT=	The Router Exploitation Framework
+LICENSE=	modified-bsd
+
+DEPENDS+=	${PYPKGPREFIX}-requests>=2.9.1:../../devel/py-requests
+DEPENDS+=	${PYPKGPREFIX}-paramiko>=1.16.0:../../security/py-paramiko
+DEPENDS+=	${PYPKGPREFIX}-beautifulsoup4>=4.4.1:../../www/py-beautifulsoup4
+DEPENDS+=	${PYPKGPREFIX}-snmp>=4.3.2:../../wip/py-snmp
+
+USE_LANGUAGES=	# none
+
+PYTHON_VERSIONS_INCOMPATIBLE=	34 35 36 # not yet ported as of 2.2.1
+
+post-extract:
+	${CP} ${FILESDIR}/setup.py ${WRKSRC}
+
+.include "../../lang/python/application.mk"
+.include "../../lang/python/egg.mk"
+.include "../../mk/bsd.pkg.mk"
diff --git a/routersploit/PLIST b/routersploit/PLIST
new file mode 100644
index 0000000000..ff062ff5cb
--- /dev/null
+++ b/routersploit/PLIST
@@ -0,0 +1,403 @@
+@comment $NetBSD$
+bin/rsf.py
+${PYSITELIB}/${EGG_INFODIR}/PKG-INFO
+${PYSITELIB}/${EGG_INFODIR}/SOURCES.txt
+${PYSITELIB}/${EGG_INFODIR}/dependency_links.txt
+${PYSITELIB}/${EGG_INFODIR}/top_level.txt
+${PYSITELIB}/routersploit/__init__.py
+${PYSITELIB}/routersploit/__init__.pyc
+${PYSITELIB}/routersploit/__init__.pyo
+${PYSITELIB}/routersploit/exceptions.py
+${PYSITELIB}/routersploit/exceptions.pyc
+${PYSITELIB}/routersploit/exceptions.pyo
+${PYSITELIB}/routersploit/exploits.py
+${PYSITELIB}/routersploit/exploits.pyc
+${PYSITELIB}/routersploit/exploits.pyo
+${PYSITELIB}/routersploit/interpreter.py
+${PYSITELIB}/routersploit/interpreter.pyc
+${PYSITELIB}/routersploit/interpreter.pyo
+${PYSITELIB}/routersploit/modules/__init__.py
+${PYSITELIB}/routersploit/modules/__init__.pyc
+${PYSITELIB}/routersploit/modules/__init__.pyo
+${PYSITELIB}/routersploit/modules/creds/__init__.py
+${PYSITELIB}/routersploit/modules/creds/__init__.pyc
+${PYSITELIB}/routersploit/modules/creds/__init__.pyo
+${PYSITELIB}/routersploit/modules/creds/ftp_bruteforce.py
+${PYSITELIB}/routersploit/modules/creds/ftp_bruteforce.pyc
+${PYSITELIB}/routersploit/modules/creds/ftp_bruteforce.pyo
+${PYSITELIB}/routersploit/modules/creds/ftp_default.py
+${PYSITELIB}/routersploit/modules/creds/ftp_default.pyc
+${PYSITELIB}/routersploit/modules/creds/ftp_default.pyo
+${PYSITELIB}/routersploit/modules/creds/http_basic_bruteforce.py
+${PYSITELIB}/routersploit/modules/creds/http_basic_bruteforce.pyc
+${PYSITELIB}/routersploit/modules/creds/http_basic_bruteforce.pyo
+${PYSITELIB}/routersploit/modules/creds/http_basic_default.py
+${PYSITELIB}/routersploit/modules/creds/http_basic_default.pyc
+${PYSITELIB}/routersploit/modules/creds/http_basic_default.pyo
+${PYSITELIB}/routersploit/modules/creds/http_form_bruteforce.py
+${PYSITELIB}/routersploit/modules/creds/http_form_bruteforce.pyc
+${PYSITELIB}/routersploit/modules/creds/http_form_bruteforce.pyo
+${PYSITELIB}/routersploit/modules/creds/http_form_default.py
+${PYSITELIB}/routersploit/modules/creds/http_form_default.pyc
+${PYSITELIB}/routersploit/modules/creds/http_form_default.pyo
+${PYSITELIB}/routersploit/modules/creds/snmp_bruteforce.py
+${PYSITELIB}/routersploit/modules/creds/snmp_bruteforce.pyc
+${PYSITELIB}/routersploit/modules/creds/snmp_bruteforce.pyo
+${PYSITELIB}/routersploit/modules/creds/ssh_bruteforce.py
+${PYSITELIB}/routersploit/modules/creds/ssh_bruteforce.pyc
+${PYSITELIB}/routersploit/modules/creds/ssh_bruteforce.pyo
+${PYSITELIB}/routersploit/modules/creds/ssh_default.py
+${PYSITELIB}/routersploit/modules/creds/ssh_default.pyc
+${PYSITELIB}/routersploit/modules/creds/ssh_default.pyo
+${PYSITELIB}/routersploit/modules/creds/telnet_bruteforce.py
+${PYSITELIB}/routersploit/modules/creds/telnet_bruteforce.pyc
+${PYSITELIB}/routersploit/modules/creds/telnet_bruteforce.pyo
+${PYSITELIB}/routersploit/modules/creds/telnet_default.py
+${PYSITELIB}/routersploit/modules/creds/telnet_default.pyc
+${PYSITELIB}/routersploit/modules/creds/telnet_default.pyo
+${PYSITELIB}/routersploit/modules/exploits/2wire/4011g_5012nv_path_traversal.py
+${PYSITELIB}/routersploit/modules/exploits/2wire/4011g_5012nv_path_traversal.pyc
+${PYSITELIB}/routersploit/modules/exploits/2wire/4011g_5012nv_path_traversal.pyo
+${PYSITELIB}/routersploit/modules/exploits/2wire/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/2wire/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/2wire/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/2wire/gateway_auth_bypass.py
+${PYSITELIB}/routersploit/modules/exploits/2wire/gateway_auth_bypass.pyc
+${PYSITELIB}/routersploit/modules/exploits/2wire/gateway_auth_bypass.pyo
+${PYSITELIB}/routersploit/modules/exploits/3com/3cradsl72_info_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/3com/3cradsl72_info_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/3com/3cradsl72_info_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/3com/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/3com/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/3com/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/3com/ap8760_password_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/3com/ap8760_password_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/3com/ap8760_password_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/3com/imc_info_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/3com/imc_info_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/3com/imc_info_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/3com/imc_path_traversal.py
+${PYSITELIB}/routersploit/modules/exploits/3com/imc_path_traversal.pyc
+${PYSITELIB}/routersploit/modules/exploits/3com/imc_path_traversal.pyo
+${PYSITELIB}/routersploit/modules/exploits/3com/officeconnect_info_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/3com/officeconnect_info_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/3com/officeconnect_info_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/3com/officeconnect_rce.py
+${PYSITELIB}/routersploit/modules/exploits/3com/officeconnect_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/3com/officeconnect_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/asmax/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/asmax/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/asmax/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/asmax/ar_1004g_password_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/asmax/ar_1004g_password_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/asmax/ar_1004g_password_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/asmax/ar_804_gu_rce.py
+${PYSITELIB}/routersploit/modules/exploits/asmax/ar_804_gu_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/asmax/ar_804_gu_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/asus/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/asus/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/asus/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/asus/infosvr_backdoor_rce.py
+${PYSITELIB}/routersploit/modules/exploits/asus/infosvr_backdoor_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/asus/infosvr_backdoor_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/asus/rt_n16_password_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/asus/rt_n16_password_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/asus/rt_n16_password_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/belkin/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/belkin/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/belkin/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/belkin/g_n150_password_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/belkin/g_n150_password_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/belkin/g_n150_password_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/belkin/g_plus_info_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/belkin/g_plus_info_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/belkin/g_plus_info_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/belkin/n150_path_traversal.py
+${PYSITELIB}/routersploit/modules/exploits/belkin/n150_path_traversal.pyc
+${PYSITELIB}/routersploit/modules/exploits/belkin/n150_path_traversal.pyo
+${PYSITELIB}/routersploit/modules/exploits/belkin/n750_rce.py
+${PYSITELIB}/routersploit/modules/exploits/belkin/n750_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/belkin/n750_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/cisco/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/cisco/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/cisco/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/cisco/dpc2420_info_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/cisco/dpc2420_info_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/cisco/dpc2420_info_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/cisco/ucm_info_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/cisco/ucm_info_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/cisco/ucm_info_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/cisco/ucs_manager_rce.py
+${PYSITELIB}/routersploit/modules/exploits/cisco/ucs_manager_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/cisco/ucs_manager_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/cisco/unified_multi_path_traversal.py
+${PYSITELIB}/routersploit/modules/exploits/cisco/unified_multi_path_traversal.pyc
+${PYSITELIB}/routersploit/modules/exploits/cisco/unified_multi_path_traversal.pyo
+${PYSITELIB}/routersploit/modules/exploits/cisco/video_surv_path_traversal.py
+${PYSITELIB}/routersploit/modules/exploits/cisco/video_surv_path_traversal.pyc
+${PYSITELIB}/routersploit/modules/exploits/cisco/video_surv_path_traversal.pyo
+${PYSITELIB}/routersploit/modules/exploits/comtrend/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/comtrend/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/comtrend/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/comtrend/ct_5361t_password_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/comtrend/ct_5361t_password_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/comtrend/ct_5361t_password_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dcs_930l_auth_rce.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dcs_930l_auth_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dcs_930l_auth_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_300_320_600_615_info_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_300_320_600_615_info_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_300_320_600_615_info_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_300_320_615_auth_bypass.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_300_320_615_auth_bypass.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_300_320_615_auth_bypass.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_300_600_rce.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_300_600_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_300_600_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_300_645_815_upnp_rce.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_300_645_815_upnp_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_300_645_815_upnp_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_645_815_rce.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_645_815_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_645_815_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_645_password_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_645_password_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_645_password_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_825_path_traversal.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_825_path_traversal.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dir_825_path_traversal.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dns_320l_327l_rce.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dns_320l_327l_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dns_320l_327l_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dsl_2640b_dns_change.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dsl_2640b_dns_change.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dsl_2640b_dns_change.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dsl_2730b_2780b_526b_dns_change.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dsl_2730b_2780b_526b_dns_change.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dsl_2730b_2780b_526b_dns_change.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dsl_2740r_dns_change.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dsl_2740r_dns_change.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dsl_2740r_dns_change.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dsl_2750b_info_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dsl_2750b_info_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dsl_2750b_info_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dvg_n5402sp_path_traversal.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dvg_n5402sp_path_traversal.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dvg_n5402sp_path_traversal.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/dwr_932_info_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/dwr_932_info_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/dwr_932_info_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/dlink/multi_hnap_rce.py
+${PYSITELIB}/routersploit/modules/exploits/dlink/multi_hnap_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/dlink/multi_hnap_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/fortinet/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/fortinet/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/fortinet/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/fortinet/fortigate_os_backdoor.py
+${PYSITELIB}/routersploit/modules/exploits/fortinet/fortigate_os_backdoor.pyc
+${PYSITELIB}/routersploit/modules/exploits/fortinet/fortigate_os_backdoor.pyo
+${PYSITELIB}/routersploit/modules/exploits/huawei/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/huawei/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/huawei/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/huawei/e5331_mifi_info_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/huawei/e5331_mifi_info_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/huawei/e5331_mifi_info_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/huawei/hg520_info_dislosure.py
+${PYSITELIB}/routersploit/modules/exploits/huawei/hg520_info_dislosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/huawei/hg520_info_dislosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/huawei/hg530_hg520b_password_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/huawei/hg530_hg520b_password_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/huawei/hg530_hg520b_password_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/huawei/hg630a_default_creds.py
+${PYSITELIB}/routersploit/modules/exploits/huawei/hg630a_default_creds.pyc
+${PYSITELIB}/routersploit/modules/exploits/huawei/hg630a_default_creds.pyo
+${PYSITELIB}/routersploit/modules/exploits/huawei/hg866_password_change.py
+${PYSITELIB}/routersploit/modules/exploits/huawei/hg866_password_change.pyc
+${PYSITELIB}/routersploit/modules/exploits/huawei/hg866_password_change.pyo
+${PYSITELIB}/routersploit/modules/exploits/ipfire/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/ipfire/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/ipfire/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/ipfire/ipfire_proxy_rce.py
+${PYSITELIB}/routersploit/modules/exploits/ipfire/ipfire_proxy_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/ipfire/ipfire_proxy_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/ipfire/ipfire_shellshock.py
+${PYSITELIB}/routersploit/modules/exploits/ipfire/ipfire_shellshock.pyc
+${PYSITELIB}/routersploit/modules/exploits/ipfire/ipfire_shellshock.pyo
+${PYSITELIB}/routersploit/modules/exploits/juniper/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/juniper/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/juniper/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/juniper/screenos_backdoor.py
+${PYSITELIB}/routersploit/modules/exploits/juniper/screenos_backdoor.pyc
+${PYSITELIB}/routersploit/modules/exploits/juniper/screenos_backdoor.pyo
+${PYSITELIB}/routersploit/modules/exploits/linksys/1500_2500_rce.py
+${PYSITELIB}/routersploit/modules/exploits/linksys/1500_2500_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/linksys/1500_2500_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/linksys/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/linksys/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/linksys/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/linksys/wap54gv3_rce.py
+${PYSITELIB}/routersploit/modules/exploits/linksys/wap54gv3_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/linksys/wap54gv3_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/multi/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/multi/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/multi/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/multi/heartbleed.py
+${PYSITELIB}/routersploit/modules/exploits/multi/heartbleed.pyc
+${PYSITELIB}/routersploit/modules/exploits/multi/heartbleed.pyo
+${PYSITELIB}/routersploit/modules/exploits/multi/misfortune_cookie.py
+${PYSITELIB}/routersploit/modules/exploits/multi/misfortune_cookie.pyc
+${PYSITELIB}/routersploit/modules/exploits/multi/misfortune_cookie.pyo
+${PYSITELIB}/routersploit/modules/exploits/multi/shellshock.py
+${PYSITELIB}/routersploit/modules/exploits/multi/shellshock.pyc
+${PYSITELIB}/routersploit/modules/exploits/multi/shellshock.pyo
+${PYSITELIB}/routersploit/modules/exploits/multi/ssh_auth_keys.py
+${PYSITELIB}/routersploit/modules/exploits/multi/ssh_auth_keys.pyc
+${PYSITELIB}/routersploit/modules/exploits/multi/ssh_auth_keys.pyo
+${PYSITELIB}/routersploit/modules/exploits/multi/tcp_32764_info_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/multi/tcp_32764_info_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/multi/tcp_32764_info_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/multi/tcp_32764_rce.py
+${PYSITELIB}/routersploit/modules/exploits/multi/tcp_32764_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/multi/tcp_32764_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/netcore/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/netcore/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/netcore/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/netcore/udp_53413_rce.py
+${PYSITELIB}/routersploit/modules/exploits/netcore/udp_53413_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/netcore/udp_53413_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/netgear/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/netgear/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/netgear/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/netgear/multi_rce.py
+${PYSITELIB}/routersploit/modules/exploits/netgear/multi_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/netgear/multi_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/netgear/n300_auth_bypass.py
+${PYSITELIB}/routersploit/modules/exploits/netgear/n300_auth_bypass.pyc
+${PYSITELIB}/routersploit/modules/exploits/netgear/n300_auth_bypass.pyo
+${PYSITELIB}/routersploit/modules/exploits/netgear/prosafe_rce.py
+${PYSITELIB}/routersploit/modules/exploits/netgear/prosafe_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/netgear/prosafe_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/netsys/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/netsys/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/netsys/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/netsys/multi_rce.py
+${PYSITELIB}/routersploit/modules/exploits/netsys/multi_rce.pyc
+${PYSITELIB}/routersploit/modules/exploits/netsys/multi_rce.pyo
+${PYSITELIB}/routersploit/modules/exploits/shuttle/915wm_dns_change.py
+${PYSITELIB}/routersploit/modules/exploits/shuttle/915wm_dns_change.pyc
+${PYSITELIB}/routersploit/modules/exploits/shuttle/915wm_dns_change.pyo
+${PYSITELIB}/routersploit/modules/exploits/shuttle/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/shuttle/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/shuttle/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/technicolor/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/technicolor/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/technicolor/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/technicolor/tc7200_password_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/technicolor/tc7200_password_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/technicolor/tc7200_password_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/thomson/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/thomson/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/thomson/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/thomson/twg849_info_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/thomson/twg849_info_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/thomson/twg849_info_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/thomson/twg850_password_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/thomson/twg850_password_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/thomson/twg850_password_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/tplink/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/tplink/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/tplink/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/tplink/wdr740nd_wdr740n_backdoor.py
+${PYSITELIB}/routersploit/modules/exploits/tplink/wdr740nd_wdr740n_backdoor.pyc
+${PYSITELIB}/routersploit/modules/exploits/tplink/wdr740nd_wdr740n_backdoor.pyo
+${PYSITELIB}/routersploit/modules/exploits/tplink/wdr740nd_wdr740n_path_traversal.py
+${PYSITELIB}/routersploit/modules/exploits/tplink/wdr740nd_wdr740n_path_traversal.pyc
+${PYSITELIB}/routersploit/modules/exploits/tplink/wdr740nd_wdr740n_path_traversal.pyo
+${PYSITELIB}/routersploit/modules/exploits/ubiquiti/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/ubiquiti/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/ubiquiti/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/ubiquiti/airos_6_x.py
+${PYSITELIB}/routersploit/modules/exploits/ubiquiti/airos_6_x.pyc
+${PYSITELIB}/routersploit/modules/exploits/ubiquiti/airos_6_x.pyo
+${PYSITELIB}/routersploit/modules/exploits/zte/__init__.py
+${PYSITELIB}/routersploit/modules/exploits/zte/__init__.pyc
+${PYSITELIB}/routersploit/modules/exploits/zte/__init__.pyo
+${PYSITELIB}/routersploit/modules/exploits/zte/f460_f660_backdoor.py
+${PYSITELIB}/routersploit/modules/exploits/zte/f460_f660_backdoor.pyc
+${PYSITELIB}/routersploit/modules/exploits/zte/f460_f660_backdoor.pyo
+${PYSITELIB}/routersploit/modules/exploits/zte/f609_config_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/zte/f609_config_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/zte/f609_config_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/zte/f660_config_disclosure.py
+${PYSITELIB}/routersploit/modules/exploits/zte/f660_config_disclosure.pyc
+${PYSITELIB}/routersploit/modules/exploits/zte/f660_config_disclosure.pyo
+${PYSITELIB}/routersploit/modules/exploits/zte/f6xx_default_root.py
+${PYSITELIB}/routersploit/modules/exploits/zte/f6xx_default_root.pyc
+${PYSITELIB}/routersploit/modules/exploits/zte/f6xx_default_root.pyo
+${PYSITELIB}/routersploit/modules/scanners/__init__.py
+${PYSITELIB}/routersploit/modules/scanners/__init__.pyc
+${PYSITELIB}/routersploit/modules/scanners/__init__.pyo
+${PYSITELIB}/routersploit/modules/scanners/autopwn.py
+${PYSITELIB}/routersploit/modules/scanners/autopwn.pyc
+${PYSITELIB}/routersploit/modules/scanners/autopwn.pyo
+${PYSITELIB}/routersploit/modules/scanners/dlink_scan.py
+${PYSITELIB}/routersploit/modules/scanners/dlink_scan.pyc
+${PYSITELIB}/routersploit/modules/scanners/dlink_scan.pyo
+${PYSITELIB}/routersploit/printer.py
+${PYSITELIB}/routersploit/printer.pyc
+${PYSITELIB}/routersploit/printer.pyo
+${PYSITELIB}/routersploit/shell.py
+${PYSITELIB}/routersploit/shell.pyc
+${PYSITELIB}/routersploit/shell.pyo
+${PYSITELIB}/routersploit/templates/__init__.py
+${PYSITELIB}/routersploit/templates/__init__.pyc
+${PYSITELIB}/routersploit/templates/__init__.pyo
+${PYSITELIB}/routersploit/templates/exploit.py
+${PYSITELIB}/routersploit/templates/exploit.pyc
+${PYSITELIB}/routersploit/templates/exploit.pyo
+${PYSITELIB}/routersploit/test/__init__.py
+${PYSITELIB}/routersploit/test/__init__.pyc
+${PYSITELIB}/routersploit/test/__init__.pyo
+${PYSITELIB}/routersploit/test/test_case.py
+${PYSITELIB}/routersploit/test/test_case.pyc
+${PYSITELIB}/routersploit/test/test_case.pyo
+${PYSITELIB}/routersploit/test/test_completer.py
+${PYSITELIB}/routersploit/test/test_completer.pyc
+${PYSITELIB}/routersploit/test/test_completer.pyo
+${PYSITELIB}/routersploit/test/test_exploits.py
+${PYSITELIB}/routersploit/test/test_exploits.pyc
+${PYSITELIB}/routersploit/test/test_exploits.pyo
+${PYSITELIB}/routersploit/test/test_interpreter.py
+${PYSITELIB}/routersploit/test/test_interpreter.pyc
+${PYSITELIB}/routersploit/test/test_interpreter.pyo
+${PYSITELIB}/routersploit/test/test_modules.py
+${PYSITELIB}/routersploit/test/test_modules.pyc
+${PYSITELIB}/routersploit/test/test_modules.pyo
+${PYSITELIB}/routersploit/test/test_utils.py
+${PYSITELIB}/routersploit/test/test_utils.pyc
+${PYSITELIB}/routersploit/test/test_utils.pyo
+${PYSITELIB}/routersploit/test/test_validators.py
+${PYSITELIB}/routersploit/test/test_validators.pyc
+${PYSITELIB}/routersploit/test/test_validators.pyo
+${PYSITELIB}/routersploit/threads.py
+${PYSITELIB}/routersploit/threads.pyc
+${PYSITELIB}/routersploit/threads.pyo
+${PYSITELIB}/routersploit/utils.py
+${PYSITELIB}/routersploit/utils.pyc
+${PYSITELIB}/routersploit/utils.pyo
+${PYSITELIB}/routersploit/validators.py
+${PYSITELIB}/routersploit/validators.pyc
+${PYSITELIB}/routersploit/validators.pyo
+${PYSITELIB}/routersploit/wordlists/__init__.py
+${PYSITELIB}/routersploit/wordlists/__init__.pyc
+${PYSITELIB}/routersploit/wordlists/__init__.pyo
+${PYSITELIB}/routersploit/wordlists/defaults.txt
+${PYSITELIB}/routersploit/wordlists/passwords.txt
+${PYSITELIB}/routersploit/wordlists/snmp.txt
+${PYSITELIB}/routersploit/wordlists/usernames.txt
diff --git a/routersploit/distinfo b/routersploit/distinfo
new file mode 100644
index 0000000000..3da0a471ee
--- /dev/null
+++ b/routersploit/distinfo
@@ -0,0 +1,6 @@
+$NetBSD: distinfo,v 1.3 2017/09/14 12:43:54 leot Exp $
+
+SHA1 (routersploit-2.2.1.tar.gz) = 2c03ee4459869258226a74e7e1cc5fc263bf93fe
+RMD160 (routersploit-2.2.1.tar.gz) = 4931a2b61ee1d518b44126f1c3aaf7990c68b934
+SHA512 (routersploit-2.2.1.tar.gz) = 59262588fb1004a22c72f6f551f455f82bc461c2768dd001694c8a395cf11796138627f9bf94f45da1f289910b9119bcbabd1deb74f97e2649220631a59bcb4a
+Size (routersploit-2.2.1.tar.gz) = 80925 bytes
diff --git a/routersploit/files/setup.py b/routersploit/files/setup.py
new file mode 100644
index 0000000000..75590ffa5e
--- /dev/null
+++ b/routersploit/files/setup.py
@@ -0,0 +1,20 @@
+# $NetBSD$
+# $OpenBSD: setup.py,v 1.1.1.1 2016/07/04 21:02:08 awolk Exp $
+
+from setuptools import find_packages, setup
+import sys, os
+
+setup(
+	name = "routersploit",
+	version = "2.2.1",
+	description = "The Router Exploitation Framework",
+	author =  "Reverse Shell Security",
+	author_email = "office%reverse-shell.com@localhost",
+	license = "BSD",
+	url = "https://github.com/reverse-shell/routersploit";,
+	packages=find_packages(),
+	package_data = {'' : ['*.txt']},
+	include_package_data = True,
+	scripts = ('rsf.py',)
+)
+


Home | Main Index | Thread Index | Old Index