├── LICENCE.md ├── README.md ├── Web ├── ASUS │ ├── CVE-2021-41435 │ │ └── exploit_http.sh │ ├── CVE-2021-41436 │ │ └── exploit_http.sh │ ├── CVE-2021-41437 │ │ ├── README.md │ │ └── exploit_http.sh │ ├── HTTP-smuggling │ │ └── exploit_http.sh │ └── Stored XSS │ │ └── exploit_http ├── D-Link │ ├── CVE-2021-41440 │ │ └── exploit_http.html │ ├── CVE-2021-41441 │ │ └── exploit_http │ ├── CVE-2021-41442 │ │ ├── exploit_http1.sh │ │ ├── exploit_http2.sh │ │ └── exploit_http3.sh │ ├── CVE-2021-41443 │ │ └── exploit_http.sh │ ├── CVE-2021-41445 │ │ └── exploit_http.sh │ ├── CVE-2021-46352 │ │ └── exploit_http.sh │ └── CVE-2021-46353 │ │ └── exploit_http.sh ├── Netgear │ └── CVE-2021-41449 │ │ └── exploit_http.sh ├── TP-Link │ ├── CVE-2021-41450 │ │ └── exploit_http.sh │ ├── CVE-2021-41451 │ │ └── exploit_http.sh │ ├── Offline-decryption │ │ └── README.md │ └── Replay │ │ └── README.md └── Xiaomi │ ├── Clickjacking │ └── exploit_http.html │ └── Out-of-band │ └── exploit_http └── Wi-Fi (WPA3-SAE) ├── Broadcom ├── case1.py ├── case2.py ├── case3.py ├── case4.py ├── case5.py ├── case6.py └── case7.py ├── MediaTek ├── case12.py └── case13.py ├── Qualcomm ├── case10.py ├── case11.py ├── case8.py └── case9.py └── README.md /LICENCE.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/LICENCE.md -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/README.md -------------------------------------------------------------------------------- /Web/ASUS/CVE-2021-41435/exploit_http.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/ASUS/CVE-2021-41435/exploit_http.sh -------------------------------------------------------------------------------- /Web/ASUS/CVE-2021-41436/exploit_http.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/ASUS/CVE-2021-41436/exploit_http.sh -------------------------------------------------------------------------------- /Web/ASUS/CVE-2021-41437/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/ASUS/CVE-2021-41437/README.md -------------------------------------------------------------------------------- /Web/ASUS/CVE-2021-41437/exploit_http.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/ASUS/CVE-2021-41437/exploit_http.sh -------------------------------------------------------------------------------- /Web/ASUS/HTTP-smuggling/exploit_http.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/ASUS/HTTP-smuggling/exploit_http.sh -------------------------------------------------------------------------------- /Web/ASUS/Stored XSS/exploit_http: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/ASUS/Stored XSS/exploit_http -------------------------------------------------------------------------------- /Web/D-Link/CVE-2021-41440/exploit_http.html: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/D-Link/CVE-2021-41440/exploit_http.html -------------------------------------------------------------------------------- /Web/D-Link/CVE-2021-41441/exploit_http: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/D-Link/CVE-2021-41441/exploit_http -------------------------------------------------------------------------------- /Web/D-Link/CVE-2021-41442/exploit_http1.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/D-Link/CVE-2021-41442/exploit_http1.sh -------------------------------------------------------------------------------- /Web/D-Link/CVE-2021-41442/exploit_http2.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/D-Link/CVE-2021-41442/exploit_http2.sh -------------------------------------------------------------------------------- /Web/D-Link/CVE-2021-41442/exploit_http3.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/D-Link/CVE-2021-41442/exploit_http3.sh -------------------------------------------------------------------------------- /Web/D-Link/CVE-2021-41443/exploit_http.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/D-Link/CVE-2021-41443/exploit_http.sh -------------------------------------------------------------------------------- /Web/D-Link/CVE-2021-41445/exploit_http.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/D-Link/CVE-2021-41445/exploit_http.sh -------------------------------------------------------------------------------- /Web/D-Link/CVE-2021-46352/exploit_http.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/D-Link/CVE-2021-46352/exploit_http.sh -------------------------------------------------------------------------------- /Web/D-Link/CVE-2021-46353/exploit_http.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/D-Link/CVE-2021-46353/exploit_http.sh -------------------------------------------------------------------------------- /Web/Netgear/CVE-2021-41449/exploit_http.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/Netgear/CVE-2021-41449/exploit_http.sh -------------------------------------------------------------------------------- /Web/TP-Link/CVE-2021-41450/exploit_http.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/TP-Link/CVE-2021-41450/exploit_http.sh -------------------------------------------------------------------------------- /Web/TP-Link/CVE-2021-41451/exploit_http.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/TP-Link/CVE-2021-41451/exploit_http.sh -------------------------------------------------------------------------------- /Web/TP-Link/Offline-decryption/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/TP-Link/Offline-decryption/README.md -------------------------------------------------------------------------------- /Web/TP-Link/Replay/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/TP-Link/Replay/README.md -------------------------------------------------------------------------------- /Web/Xiaomi/Clickjacking/exploit_http.html: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/Xiaomi/Clickjacking/exploit_http.html -------------------------------------------------------------------------------- /Web/Xiaomi/Out-of-band/exploit_http: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Web/Xiaomi/Out-of-band/exploit_http -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/Broadcom/case1.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/Broadcom/case1.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/Broadcom/case2.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/Broadcom/case2.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/Broadcom/case3.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/Broadcom/case3.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/Broadcom/case4.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/Broadcom/case4.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/Broadcom/case5.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/Broadcom/case5.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/Broadcom/case6.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/Broadcom/case6.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/Broadcom/case7.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/Broadcom/case7.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/MediaTek/case12.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/MediaTek/case12.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/MediaTek/case13.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/MediaTek/case13.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/Qualcomm/case10.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/Qualcomm/case10.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/Qualcomm/case11.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/Qualcomm/case11.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/Qualcomm/case8.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/Qualcomm/case8.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/Qualcomm/case9.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/Qualcomm/case9.py -------------------------------------------------------------------------------- /Wi-Fi (WPA3-SAE)/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/efchatz/easy-exploits/HEAD/Wi-Fi (WPA3-SAE)/README.md --------------------------------------------------------------------------------