RouterSploit is an open-source exploitation framework designed to identify and exploit vulnerabilities in embedded devices.
Exploitation Framework for Embedded Devices
This tool is primarily used by penetration testers and red teamers to assess the security of embedded devices such as routers and IoT hardware by scanning for vulnerabilities, testing credentials, and deploying exploits. It aids security professionals in identifying weaknesses and validating security controls in embedded environments.
RouterSploit is under active development with frequent module updates, so users should regularly update the tool to access the latest exploits and features. It requires Python 3.6 and several dependencies, with optional Bluetooth Low Energy support for extended attack surfaces. Users should have appropriate authorization before testing embedded devices to avoid legal issues.
Install python3-pip (e.g., apt-get install python3-pip)
Clone the repository: git clone https://github.com/threat9/routersploit
Navigate to the cloned directory: cd routersploit
Install required Python dependencies: python3 -m pip install -r requirements.txt
Run the framework: python3 rsf.py
For Bluetooth Low Energy support, install libglib2.0-dev (e.g., apt-get install libglib2.0-dev)
Install bluepy for BLE: python3 -m pip install bluepy
Run the framework again: python3 rsf.py
On Docker, build and run with: docker compose up --build -d
Attach to the running Docker container: docker attach routersploit
python3 rsf.py
Launches the RouterSploit interactive shell for penetration testing
git clone https://github.com/threat9/routersploit
Clones the RouterSploit repository from GitHub
python3 -m pip install -r requirements.txt
Installs all required Python dependencies for RouterSploit
docker compose up --build -d
Builds and runs RouterSploit inside a Docker container in detached mode
docker attach routersploit
Attaches to the running RouterSploit Docker container for interactive use
git pull
Updates the RouterSploit framework to the latest version