Export - mrhenrike/MikrotikAPI-BF GitHub Wiki
Export
Language: English · Português (pt-BR)
Export results to multiple formats for evidence collection and pentest deliverables.
Export Flags
| Flag | Output |
|---|---|
--export-json |
results/mikrotik_IP_TIMESTAMP.json |
--export-csv |
results/mikrotik_IP_TIMESTAMP.csv |
--export-xml |
results/mikrotik_IP_TIMESTAMP.xml |
--export-txt |
results/mikrotik_IP_TIMESTAMP.txt |
--export-all |
All of the above simultaneously |
--export sarif |
SARIF v2.1.0 for CI/CD integration (v3.10.0+) |
--audit-report |
Professional PDF audit report |
--export-dir PATH |
Custom output directory (default: results/) |
Usage
# Export all formats
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt --export-all
# Export to custom directory
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt \
--export-all \
--export-dir /mnt/pentest/client-x/
# With audit report
python mikrotikapi-bf.py -t 192.168.88.1 -d combos.txt \
--export-all \
--audit-report
JSON Output
{
"target": "192.168.88.1",
"scan_date": "2026-03-28T03:00:00Z",
"duration_seconds": 1823,
"total_attempts": 50000,
"successful_credentials": [
{
"username": "admin",
"password": "password123",
"validated_services": ["api", "ftp", "ssh"],
"routeros_version": "7.12.1",
"board_model": "RouterBOARD 450Gx4",
"serial": "HF507ABCDE12"
}
],
"fingerprint": {
"routeros_version": "7.12.1",
"board": "RouterBOARD 450Gx4",
"open_ports": [22, 80, 8291, 8728]
},
"cves": [
{ "id": "CVE-2023-30799", "cvss": 9.1, "description": "..." }
]
}
CSV Output
target,username,password,validated_services,routeros_version,board,serial
192.168.88.1,admin,password123,"api,ftp,ssh",7.12.1,RouterBOARD 450Gx4,HF507ABCDE12
Audit Report
The --audit-report flag generates a professional PDF document including:
- Executive summary
- Target information and scan metadata
- Findings: credentials found, severity, CVSS
- CVEs applicable to the detected firmware
- Risk rating
- Recommendations (password policy, service restrictions, firmware update)
- Appendix: full attempt log
SARIF Export (v3.10.0+)
SARIF v2.1.0 output integrates directly with:
- GitHub Code Scanning / Security tab
- Azure DevOps / Pipelines
- Any CI/CD system supporting SARIF upload
python mikrotikapi-bf.py -t 192.168.1.1 --audit -U admin -P pass --export sarif
Output: results/mikrotik_IP_TIMESTAMP.sarif.json
See also: Audit Report · Sessions