{"id":"threat9-routersploit","name":"routersploit","af_score":27.8,"security_score":16.5,"reliability_score":26.2,"what_it_does":"RouterSploit is an open-source Python exploitation framework for embedded devices. It provides modular components for exploitation, credential checking, vulnerability scanning, payload generation, and generic attacks, run via a CLI entry point (e.g., rsf.py) and optionally via Docker.","best_when":"Used in controlled penetration-testing workflows against embedded devices where you have permission, and where you can operate a local Python toolchain.","avoid_when":"You need a well-defined remote API/SDK for integration, or you require strict security governance and minimal risk of misuse.","last_evaluated":"2026-03-29T13:21:55.434323+00:00","has_mcp":false,"has_api":false,"auth_methods":[],"has_free_tier":false,"known_gotchas":["No explicit agent-friendly API/MCP; automation likely requires invoking the CLI and parsing output.","Framework updates are described as frequent and may change module behavior; pin versions for repeatability.","Includes modules for credential testing and exploitation, which may require strict policy controls."],"error_quality":0.0}