Routersploit Pi


Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.  

Please ensure you are using the latest SD Card image which is available here.


Learning Outcomes

  • Learn the basic principles of Routersploit;

  • Learn how to perform a scan on different devices to look for vulnerabilities and then exploit the vulnerabilities;

  • Learn the different uses of Routersploit.


Hardware Required

Component Number (Peli Case)

(Base) 4 + 5

(Base) 5

(Base) 9

(Level 1) 3

(Level 1) 3

(Level 1) 5

(Level 1) 1

Component Number (Box Case)

Slot 1

Slot 11

Slot 2

Slot 11

Slot 11

Slot 12

Slot 13


Raspberry Pi + Case

Kali Linux SD Card

TFT Screen


Wireless Keyboard

Wireless Mouse

Power Supply Unit


Video Guide



This project is designed to introduce you to Routersploit and the applications it has within cyber security. You have used the Raspberry Pi to run Routersploit, then used the capability to run a scan on a router to find and then exploit these vulnerabilities.