BishopFox / forticrack
Decrypt encrypted Fortienet FortiOS firmware images
☆109Updated last year
Alternatives and similar repositories for forticrack:
Users that are interested in forticrack are comparing it to the libraries listed below
- This repo provides tools for FortiGate firmware rootfs decryption☆33Updated last year
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆157Updated last year
- ☆177Updated last year
- ☆124Updated 2 years ago
- ☆129Updated last month
- ☆212Updated 11 months ago
- Cisco ASA Software and ASDM Security Research☆81Updated 2 years ago
- An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products☆33Updated last year
- ☆153Updated 2 years ago
- ☆238Updated last week
- ☆128Updated last year
- xortigate-cve-2023-27997☆63Updated last year
- LPE exploit for CVE-2023-36802☆160Updated last year
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆117Updated 2 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆115Updated 2 weeks ago
- FortiGate automatic repack script☆20Updated last year
- POC for CVE-2021-21974 VMWare ESXi RCE Exploit☆179Updated 3 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆154Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated 11 months ago
- Windows LPE exploit for CVE-2022-37969☆133Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆58Updated 3 months ago
- ☆86Updated 2 years ago
- ☆237Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆218Updated 10 months ago
- ☆71Updated last year
- ☆123Updated last year
- ☆56Updated 4 months ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆147Updated last year
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 2 years ago
- Learnings about windows Internals☆91Updated last year