Apr 14, 2020

Router-Exploit-Shovel: An Automated Application Generator For Stack Overflow Types On Wireless Routers

About Router-Exploit-Shovel
   Router-Exploit-Shovel is an automated application generation for Stack Overflow types on Wireless Routers.

   Router exploits shovel is an automated application generation tool for stack overflow types on wireless routers. The tool implements the key functions of exploits, it can adapt to the length of the data padding on the stack, generate the ROP chain, generate the encoded shellcode, and finally assemble them into a complete attack code. The user only needs to attach the attack code to the overflow location of the POC to complete the Exploit of the remote code execution.

   The tool supports MIPSel and MIPSeb.Run on Ubuntu 16.04 64bit.

Router-Exploit-Shovel's Installation
   Open your Terminal and enter these commands:
Usage

   Example: python3 Router_Exploit_Shovel.py -b test_binaries/mipseb-httpd -l test_binaries/libuClibc-0.9.30.so -o 0x00478584

Router-Exploit-Shovel's screenshot

Code structure

ROP chain generation
   This tool uses pattern to generate ROP chains. Extract patterns from common ROP exploitation procedure. Use regex matching to find available gadgets to fill up chain strings. Base64 encoding is to avoid duplicate character escapes. For example:

Attackblocks
   You can get attackblocks generated in results/attackBlocks.txt. Such as:

You might like these similar tools:

More info


  1. Tools For Hacker
  2. Pentest Tools Download
  3. Pentest Tools Kali Linux
  4. Hacking Tools And Software
  5. Hacking Tools For Windows
  6. Hacker Tools Free
  7. Hacking Tools For Mac
  8. Hack Tool Apk No Root
  9. Pentest Tools Android
  10. Hacking Apps
  11. Hack Tools
  12. Hack And Tools
  13. Bluetooth Hacking Tools Kali
  14. Pentest Tools Website Vulnerability
  15. Usb Pentest Tools
  16. Hacker Tools List
  17. Usb Pentest Tools
  18. Hacking Tools Pc
  19. Pentest Tools Android
  20. Hacker Tools 2020
  21. Pentest Tools
  22. Hacker Hardware Tools
  23. Hacker Techniques Tools And Incident Handling

No comments:

Post a Comment