Table of Contents
Loading contents...
README.md
RouterSploit - Exploitation Framework for Embedded Devices
Community
Join community on Embedded Exploitation Discord.
Description
The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.
It consists of various modules that aid penetration testing operations:
- exploits - modules that take advantage of identified vulnerabilities
- creds - modules designed to test credentials against network services
- scanners - modules that check if a target is vulnerable to any exploit
- payloads - modules that are responsible for generating payloads for various architectures and injection points
- generic - modules that perform generic attacks
Installation
Requirements
Required:
requests
paramiko
pysnmp
pycrypto
Optional:
* bluepy - Bluetooth low energy
Installation on Kali Linux
apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py
Bluetooth Low Energy support:
apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py
Installation on Ubuntu 20.04
sudo apt-get install git python3-pip
git clone https://github.com/threat9/routersploit
cd routersploit
python3 -m pip install -r requirements.txt
python3 rsf.py
Bluetooth Low Energy support:
sudo apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py
Installation on Ubuntu 18.04 & 17.10
sudo add-apt-repository universe
sudo apt-get install git python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit
python3 -m pip install setuptools
python3 -m pip install -r requirements.txt
python3 rsf.py
Bluetooth Low Energy support:
apt-get install libglib2.0-dev
python3 -m pip install bluepy
python3 rsf.py
Installation on OSX
git clone https://www.github.com/threat9/routersploit
cd routersploit
sudo python3 -m pip install -r requirements.txt
python3 rsf.py
Running on Docker
git clone https://www.github.com/threat9/routersploit
cd routersploit
docker compose up --build -d
docker attach routersploit
To run again without rebuild
docker start routersploit
docker attach routersploit
Update
Update RouterSploit Framework often. The project is under heavy development and new modules are shipped almost every day.
cd routersploit
git pull
Build your own
To our surprise, people started to fork
routersploit not because they were
interested in the security of embedded devices but simply because they want to
leverage our interactive shell logic and build their tools using similar
concept. All these years they must have said: “There must be a better way!”
and they were completely right, the better way is called
Riposte.
Riposte allows you to easily wrap your
application inside a tailored interactive shell. Common chores regarding
building REPLs was factored out and being taken care of so you can
focus on specific domain logic of your application.
License
The RouterSploit Framework is under a BSD license.
Please see LICENSE for more details.
Acknowledgments
Tool Information
Author
threat9
Project Added On
June 24, 2025
License
Open Source
Tags
Related Tools
NetProbe
NetProbe: Network Probe
StableFluxER
FluxER - The bash script which installs and runs the Fluxion tool inside Termux. The wireless security auditing tool used to perform attacks such as WPA/WPA2 cracking and MITM attacks.
StableVillain
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
Stable