routeros-scripts VS mikrotik-scripts

Compare routeros-scripts vs mikrotik-scripts and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
routeros-scripts mikrotik-scripts
2 3
1,138 17
- -
9.8 3.6
10 days ago over 2 years ago
RouterOS Script HTML
GNU General Public License v3.0 only ISC License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

routeros-scripts

Posts with mentions or reviews of routeros-scripts. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-07-23.

mikrotik-scripts

Posts with mentions or reviews of mikrotik-scripts. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-08-31.
  • Using Control-D on your Mikrotik router
    2 projects | /r/mikrotik | 31 Aug 2023
    If on top of this, like me, you still want to be able to reference the INTERNAL resolver from the container (for example because you create static DNS entries for DHCP leases, add src-address=!172.17.0.2 to command 8 and configure an upstream option in your Control D config accordingly.
  • Base config feedback
    1 project | /r/mikrotik | 30 Jul 2022
    /interface bridge add admin-mac=48:8F:5A:2D:66:01 auto-mac=no name=bridge-rb4011 /interface ethernet set [ find default-name=ether1 ] name=ether1-wan set [ find default-name=ether10 ] name=ether10-wifi set [ find default-name=sfp-sfpplus1 ] disabled=yes name=sfpplus1 /interface wireguard add listen-port=51820 mtu=1420 name=wireguard1 private-key="xxx" /interface pppoe-client add add-default-route=yes disabled=no interface=bridge-rb4011 max-mtu=1480 name=pppoe-ais password=xxx user=xxx /interface list add name=WAN add name=LAN add name=INET /ip pool add name=main-pool ranges=10.66.11.2-10.66.11.222 /ip dhcp-server add address-pool=main-pool interface=bridge-rb4011 lease-script="[removed script, see https://github.com/arktronic/mikrotik-scripts/blob/main/dhcp-dns.rsc]" name=dhcp-main /interface bridge port add bridge=bridge-rb4011 ingress-filtering=no interface=ether2 add bridge=bridge-rb4011 ingress-filtering=no interface=ether3 add bridge=bridge-rb4011 ingress-filtering=no interface=ether4 add bridge=bridge-rb4011 ingress-filtering=no interface=ether5 add bridge=bridge-rb4011 ingress-filtering=no interface=ether6 multicast-router=disabled add bridge=bridge-rb4011 ingress-filtering=no interface=ether7 multicast-router=disabled add bridge=bridge-rb4011 ingress-filtering=no interface=ether8 add bridge=bridge-rb4011 ingress-filtering=no interface=ether9 add bridge=bridge-rb4011 ingress-filtering=no interface=ether10-wifi add bridge=bridge-rb4011 ingress-filtering=no interface=sfpplus1 add bridge=bridge-rb4011 ingress-filtering=no interface=ether1-wan multicast-router=disabled /interface list member add interface=pppoe-ais list=WAN add interface=ether1-wan list=WAN add interface=bridge-rb4011 list=LAN add interface=bridge-rb4011 list=INET add interface=wireguard1 list=INET add interface=wireguard1 list=LAN /interface wireguard peers add allowed-address=10.66.2.2/32 endpoint-address=10.66.2.1 interface=wireguard1 public-key="xxx" add allowed-address=10.66.2.3/32 endpoint-address=10.66.2.1 interface=wireguard1 public-key="xxx" add allowed-address=10.66.2.4/32 endpoint-address=10.66.2.1 interface=wireguard1 public-key="xxx" /ip address add address=10.66.2.1/24 interface=wireguard1 network=10.66.2.0 add address=10.66.11.1/24 interface=bridge-rb4011 network=10.66.11.0 /ip dhcp-server network add address=10.66.11.0/24 comment=main-dhcp-network dns-server=10.66.11.1 gateway=10.66.11.1 /ip dns set allow-remote-requests=yes use-doh-server=https://dns.nextdns.io/xxx verify-doh-cert=yes /ip dns static add address=45.90.1.0 name=dns.nextdns.io add address=45.90.2.0 name=dns.nextdns.io add address=10.66.11.1 name=router.lan [removed dns entries for brevity] /ip firewall filter add action=drop chain=forward comment="Drop invalid connections" connection-state=invalid add action=accept chain=forward comment="Allow established/related/untracked connections" connection-state=established,related,untracked add action=accept chain=forward comment="Allow internet access" in-interface-list=INET out-interface-list=WAN add action=accept chain=forward comment="Allow LAN access from Wireguard" in-interface=wireguard1 out-interface-list=LAN add action=accept chain=forward comment="Allow service A from internet" dst-port=443 in-interface-list=WAN protocol=tcp add action=accept chain=forward comment="Allow service B from internet" dst-port=8080 in-interface-list=WAN protocol=tcp add action=drop chain=forward comment="Drop everything else" log-prefix=drop add action=drop chain=input comment="Drop invalid connections" connection-state=invalid add action=accept chain=input comment="Allow established/related/untracked connections" connection-state=established,related,untracked add action=accept chain=input comment="Allow LAN to access the router" in-interface-list=LAN add action=accept chain=input comment="Allow WireGuard from internet" dst-port=51820 log=yes log-prefix=wg protocol=udp add action=accept chain=input comment="Allow ICMP for everyone" protocol=icmp add action=drop chain=input comment="Drop everything else" log-prefix=dropped /ip firewall nat add action=masquerade chain=srcnat out-interface-list=WAN add action=dst-nat chain=dstnat comment="Public access to service A" dst-port=443 in-interface-list=WAN protocol=tcp to-addresses=10.66.11.2 to-ports=443 add action=dst-nat chain=dstnat comment="Public access to service B" dst-port=8080 in-interface-list=WAN protocol=tcp to-addresses=10.66.11.2 to-ports=8080
  • What are people using for DHCP DNS creation in v7?
    2 projects | /r/mikrotik | 23 Jul 2022
    I've been using my own script on v6 and v7 (works on 7.1.1, haven't tried 7.4 yet).

What are some alternatives?

When comparing routeros-scripts and mikrotik-scripts you can also consider the following projects:

Mikrotik-RouterOS-automatic-backup-and-update - Script sends backups to email and keep your mikrotik firmware up to date.

ctrld - A highly configurable, multi-protocol DNS forwarding proxy

mikrotik_monitoring - Monitor your Mikrotik router with Prometheus and Grafana

ROS_Scripts - Scripts for RouterOS (MikroTik devices)

mikrotik-configs - Backups of my Mikrotik configuration

Mikrotik-Duckdns-Dynamic-IP-Updater - Mikrotik script to automatically update DuckDNS.org’s dynamic DNS service with your public IP address.

Mikrotik-Router-Monitoring-System - SNMP based Router Monitoring System for Mikrotik Routers

rosrestpy - RouterOS v7 REST API python module

MAC-Telnet - Open source MAC Telnet client and server for connecting to Mikrotik RouterOS routers and Posix devices using MAC addresses