![RouterOS Post Exploitation. Shared Objects, RC Scripts, and a… | by Jacob Baines | Tenable TechBlog | Medium RouterOS Post Exploitation. Shared Objects, RC Scripts, and a… | by Jacob Baines | Tenable TechBlog | Medium](https://miro.medium.com/max/953/1*Nd8fm_mIKyeN_PRlYjlL_w.png)
RouterOS Post Exploitation. Shared Objects, RC Scripts, and a… | by Jacob Baines | Tenable TechBlog | Medium
Mass MikroTik Router Infection – First we cryptojack Brazil, then we take the World? | SpiderLabs blog | Trustwave
![Virus Bulletin :: VB2019 paper: Absolutely routed!! Why routers are the new bullseye in cyber attacks Virus Bulletin :: VB2019 paper: Absolutely routed!! Why routers are the new bullseye in cyber attacks](https://www.virusbulletin.com/files/cache/f6e8c4f31730eea01f00f17d783d6613_f4110.png)
Virus Bulletin :: VB2019 paper: Absolutely routed!! Why routers are the new bullseye in cyber attacks
![GitHub - 0x802/MikrotikSploit: MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities GitHub - 0x802/MikrotikSploit: MikrotikSploit is a script that searches for and exploits Mikrotik network vulnerabilities](https://raw.githubusercontent.com/0x802/MikrotikSploit/master/modules/images/b1.png)