no one is safe ...

Metasploit Modules

Unstable Modules



Exploits

  • exploit/linux/http/dlink_command_php_exec_noauth - D-Link Devices Unauthenticated Remote Command Execution
  • exploit/linux/http/dlink_diagnostic_exec_noauth - D-Link DIR-645 / DIR-815 diagnostic.php Command Execution
  • exploit/linux/http/dlink_dir300_exec_telnet - D-Link Devices Unauthenticated Remote Command Execution
  • exploit/linux/http/dlink_dir615_up_exec - D-Link DIR615h OS Command Injection
  • exploit/linux/http/dlink_upnp_exec_noauth - D-Link Devices UPnP SOAP Command Execution
  • exploit/linux/http/dlink_upnp_exec_noauth_telnetd - D-Link Devices UPnP SOAP Telnetd Command Execution
  • exploit/linux/http/dreambox_openpli_shell - OpenPLI Webif Arbitrary Command Execution
  • exploit/linux/http/linksys_e1500_apply_exec - Linksys E1500/E2500 apply.cgi Remote Command Injection
  • exploit/linux/http/linksys_wrt160nv2_apply_exec - Linksys WRT160nv2 apply.cgi Remote Command Injection
  • exploit/linux/http/linksys_wrt54gl_apply_exec - Linksys WRT54GL apply.cgi Command Execution
  • exploit/linux/http/netgear_dgn1000b_setup_exec - Netgear DGN1000B setup.cgi Remote Command Execution
  • exploit/linux/http/netgear_dgn2200b_pppoe_exec - Netgear DGN2200B pppoe.cgi Remote Command Execution
  • exploit/linux/http/raidsonic_nas_ib5220_exec_noauth - Raidsonic NAS Devices Unauthenticated Remote Command Execution
  • exploit/windows/scada/winlog_runtime_2 - Sielco Sistemi Winlog Buffer Overflow 2.07.14 - 2.07.16



Auxiliary Modules

  • auxiliary/admin/http/dlink_dir_300_600_exec_noauth - D-Link DIR-600 / DIR-300 Unauthenticated Remote Command Execution
  • auxiliary/admin/http/dlink_dir_645_password_extractor - D-Link DIR 645 Password Extractor
  • auxiliary/admin/http/dlink_dsl320b_password_extractor - D-Link DSL 320B Password Extractor
  • auxiliary/admin/http/linksys_e1500_e2500_exec - Linksys E1500/E2500 Remote Command Execution
  • auxiliary/admin/http/linksys_wrt54gl_exec - Linksys WRT54GL Remote Command Execution
  • auxiliary/scanner/http/dlink_dir_300_615_http_login - D-Link DIR-300A / DIR-320 / DIR-615D HTTP Login Utility
  • auxiliary/scanner/http/dlink_dir_615h_http_login - D-Link DIR-615H HTTP Login Utility
  • auxiliary/scanner/http/dlink_dir_session_cgi_http_login - D-Link DIR-300B / DIR-600B / DIR-815 / DIR-645 HTTP Login Utility
  • auxiliary/scanner/http/dlink_user_agent_backdoor - D-Link User-Agent Backdoor Scanner
  • auxiliary/scanner/http/http_traversal - Generic HTTP Directory Traversal Utility
  • auxiliary/scanner/http/linksys_e1500_traversal - Linksys E1500 Directory Traversal Vulnerability
  • auxiliary/scanner/http/netgear_sph200d_traversal - Netgear SPH200D Directory Traversal Vulnerability
  • auxiliary/scanner/http/tplink_traversal_noauth - TP-Link Wireless Lite N Access Point Directory Traversal Vulnerability