A comprehensive all-in-one Python-based Proof of Concept script to discover and exploit a critical authentication bypass vulnerability (CVE-2024-55591) in certain Fortinet devices.
☆12May 26, 2025Updated 11 months ago
Alternatives and similar repositories for CVE-2024-55591-POC
Users that are interested in CVE-2024-55591-POC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stream an audio input device over HTTP as mp3☆16May 26, 2022Updated 3 years ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- X-fucknet is the best tool with full power to carry out DDOS attacks {Distributed Denial of Service}☆12Oct 16, 2025Updated 6 months ago
- A curated list of free, tested proxies by EbraSha — updated every 10 minutes for maximum availability and freedom. Also on Telegram: http…☆28Updated this week
- simplest http flooder (ddos / cc website attack) in golang, TLS(https) support, keep-alive connection abuse, http proxy support, custom r…☆12Jul 18, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SentinelaNet é uma CNC (Comando e Controle) em Python, projetada para gerenciar um malware que realiza ataques de disparos em massa (DDoS…☆12Feb 16, 2026Updated 2 months ago
- ☆11Sep 5, 2019Updated 6 years ago
- HTTP-BROWSER layer 7 attack method bypassing Cloudflare JS Challenges and HTTP-DDOS ruleset.☆11Jan 30, 2024Updated 2 years ago
- Ivanti EPM SQL Injection Remote Code Execution Vulnerability☆26Jun 12, 2024Updated last year
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 11 years ago
- PoC☆12Apr 7, 2025Updated last year
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon dll.☆15Oct 7, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A curated list of Hardware Hacking resources☆12Apr 14, 2020Updated 6 years ago
- Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)☆95Apr 2, 2025Updated last year
- Writeups for ECSC 2019 National Phase☆10Jun 5, 2019Updated 6 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- 💣 HTTP Flood based on AsyncIO☆13Apr 6, 2022Updated 4 years ago
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆16May 16, 2024Updated last year
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- A Python library and set of scripts to create labelled audio datasets from raw audio files and use them to train sound detection models.☆44Mar 6, 2025Updated last year
- kerberos in rust for fun and profit☆73Mar 13, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- ☆19Apr 16, 2026Updated 3 weeks ago
- Executes distributed denial-of-service attacks on websites/IPs☆22Aug 1, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆44Oct 9, 2024Updated last year
- Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12☆13Aug 12, 2024Updated last year
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- programmatic control of the mouse☆16Jun 28, 2023Updated 2 years ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- DDoS Attack☆19Aug 19, 2023Updated 2 years ago
- ☆13Apr 14, 2024Updated 2 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated 2 months ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆20Aug 21, 2024Updated last year
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- ☆14Aug 17, 2025Updated 8 months ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year