All Projects → malwaredllc → Bamf

malwaredllc / Bamf

Licence: gpl-3.0
A tool which utilizes Shodan to detect vulnerable IoT devices.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Bamf

TG799VAC-XTREME-17.2-MINT
My personal unique wiki for hacking the router firmware used by (Telia)TG799vac Xtream v17.2-MINT delivered from Technicolor
Stars: ✭ 71 (-73.61%)
Mutual labels:  router, backdoor
Kill Router
Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-78.81%)
Mutual labels:  router, shodan
Franxx
A vanilla JavaScript router that works everywhere.
Stars: ✭ 255 (-5.2%)
Mutual labels:  router
Remot3d
Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (-2.23%)
Mutual labels:  backdoor
Muxie
Muxie is a modern, fast and light HTTP multiplexer for Go. Fully compatible with the http.Handler interface. Written for everyone.
Stars: ✭ 257 (-4.46%)
Mutual labels:  router
Ddnsto
DDNSTO 文档以及问题反馈。
Stars: ✭ 255 (-5.2%)
Mutual labels:  router
Tentacle
Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It supports calls to zoomeye, fofa, shodan and other APIs to perform bulk vulnerability verification for multiple targets.
Stars: ✭ 258 (-4.09%)
Mutual labels:  shodan
box-appServer
The Staff-Manager App Server for Enterprise Token Safe BOX
Stars: ✭ 22 (-91.82%)
Mutual labels:  router
Ffrouter
Powerful and easy-to-use URL routing library in iOS that supports URL Rewrite(强大、易用、支持 URL Rewrite的 iOS 路由库)
Stars: ✭ 263 (-2.23%)
Mutual labels:  router
Found Relay
Relay integration for Found
Stars: ✭ 258 (-4.09%)
Mutual labels:  router
Curi
A JavaScript router for single-page applications
Stars: ✭ 262 (-2.6%)
Mutual labels:  router
T Mvp
Android AOP Architecture by Apt, AspectJ, Javassisit, based on Realm+Databinding+MVP+Retrofit+Rxjava2
Stars: ✭ 2,740 (+918.59%)
Mutual labels:  router
Hyperapp Router
Declarative routing for Hyperapp V1 using the History API.
Stars: ✭ 256 (-4.83%)
Mutual labels:  router
Threatpinchlookup
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Stars: ✭ 257 (-4.46%)
Mutual labels:  shodan
Bluebox Ng
Pentesting framework using Node.js powers, focused in VoIP.
Stars: ✭ 255 (-5.2%)
Mutual labels:  shodan
Frontexpress
An Express.js-Style router for the front-end
Stars: ✭ 263 (-2.23%)
Mutual labels:  router
HackServ
Python 3 IRC Bot / Botnet
Stars: ✭ 28 (-89.59%)
Mutual labels:  backdoor
Asuswrt Merlin.ng
Third party firmware for Asus routers (newer codebase)
Stars: ✭ 3,400 (+1163.94%)
Mutual labels:  router
Hybrid Navigation
React Native Navigation that supports seamless navigation between Native and React.
Stars: ✭ 258 (-4.09%)
Mutual labels:  router
React Native Simple Router
A community maintained router component for React Native
Stars: ✭ 266 (-1.12%)
Mutual labels:  router

BAMF

license version

DISCLAIMER: This project should be used for authorized testing and educational purposes only.

BAMF is an open-source tool designed to leverage Shodan (a search engine for the Internet of Things) to discover routers vulnerable to CVE-2013-6026, commonly known as Joel's Backdoor, a severe vulnerability allowing unauthenticated access to the administration panel of many routers made by D-Link, one of the world's largest manufacturers of routers for home and business.


Installation

  1. Download or clone the repository (git clone https://github.com/malwaredllc/bamf)
  2. Install the required Python packages (pip install -r bamf/requirements.txt)
  3. Create a free Shodan account at https://account.shodan.io/register
  4. Configure BAMF to use your Shodan API key (python bamf.py [--shodan API])

Usage

  • Use the search command to search the internet for potential
  • Use the scan command to scan the target routers for backdoors
  • Use the map command to map the networks of devices connected to vulnerable routers
  • Use the targets command to view potential targets discovered this session
  • Use the backdoors command to view routers with a confirmed backdoor
  • Use the devices command to view all devices connected to vulnerable routers

Contact

Email: [email protected]

Twitter: twitter

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].