diff --git a/README.md b/README.md index 6d6a443..fa302d2 100644 --- a/README.md +++ b/README.md @@ -1,3 +1,13 @@ +> +___ ____ _ _____ _ _ ______ _ +| \/ (_) | |_ _(_) | | ___ \ | | +| . . |_| | ___ __ ___ | | _| | __ | |_/ / ___ __ _ ___| |_ +| |\/| | | |/ / '__/ _ \| | | | |/ / | ___ \/ _ \/ _` / __| __| +| | | | | <| | | (_) | | | | < | |_/ / __/ (_| \__ \ |_ +\_| |_/_|_|\_\_| \___/\_/ |_|_|\_\ \____/ \___|\__,_|___/\__| + + + # Mikrotik Beast tool Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit. @@ -5,7 +15,7 @@ # Usage python3 mikrotikbeast.py # - Accepted input examples
+ Accepted input examples
Example 1: '192.168.5.0/24'
Example 2: '172.16.0.0/16'