Built for TAMU GCRI, Siemens, & the iStar Lab
⚡ Python • 🛡️ Security • 🔬 Lab-Ready
A one‑stop CLI tool to:
- 🔍 Fingerprint SEL relays over Telnet
- 🧠 Lookup CVEs from the NVD feed
- 🔒 Test default FTP credentials
- 🎨 Show interactive, blinking “ACC → 2AC → CAL” access‑level boxes
- Telnet Fingerprint
• Extracts MODEL, FW, FID, plus bootloader info - Privilege Elevation UI
• Animated Rich boxes for ACC → 2AC → CAL
• Real‑time color updates: 🟡 pending • 🟢 success • 🔴 failed • ⚪ skipped - CVE Lookup
• Scansnvdcve-1.1-recent.jsonfor your model
• Savescve_report.txtwith ID + description - FTP Default‑Creds Check
• Automatically testsFTPUSER/TAILon port 21 - Demo & Test Modes
•test: no network calls, simulated data
•demo: manually supply MODEL + VERSION
git clone https://github.com/ryankbr/relayred.git
cd relayred
pip install telnetlib3 rich
# download CVE feed:
# 1. go to https://nvd.nist.gov/vuln/data-feeds#JSON_FEED
# 2. grab "nvdcve-1.1-recent.json" and place it herepython sel_scanner.py 192.168.0.10python sel_scanner.py 127.0.0.1 testpython sel_scanner.py demo SEL-787 R110-V1
# add "test" at end to simulate elevation & FTP toorelayred/
├── sel_scanner.py # main CLI scanner
├── sel_fingerprint.py # telnet "id" parser
├── sel_ftp.py # ftp default‑creds tester
├── nvdcve-1.1-recent.json # NVD CVE feed (download manually)
└── .gitignore
🇨🇭 scanning relay at 10.190.42.105
📡 telnet fingerprint result:
MODEL SEL-787
FW 1.10
FID SEL-787-R110-V1-Z...
BOOTLDR R303-V0
PARTNO 0787EX1AA0BA...
🔐 checking elevation credentials:
[ACC] 🟢 [2AC] 🟡 [CAL] ⚪ ← live‑updating boxes
✅ ACC: success
❌ 2AC: failed → CAL skipped
📡 loaded cve database
🔍 found 2 CVEs for SEL-787:
• CVE-2023-1234: buffer overflow in power logic
• CVE-2022-5678: auth bypass in web interface
✔️ cve_report.txt saved
🔌 ftp login success for 10.190.42.105
Relay Red Team
Erin Cana · Ty Lavergne · Damian Lall · Ryan Kabir · Samuel Mueller
Special Thank You to:
- Dr. Hammad of the iSTAR Lab
- Mr. Simon Loo of SIEMENS
For research & lab use only.
Please do not scan devices you do not own or have permission to test.