A comprehensive all-in-one Python-based Proof of Concept script to discover and exploit a critical authentication bypass vulnerability (CVE-2024-55591) in certain Fortinet devices.
☆12May 26, 2025Updated 10 months ago
Alternatives and similar repositories for CVE-2024-55591-POC
Users that are interested in CVE-2024-55591-POC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stream an audio input device over HTTP as mp3☆16May 26, 2022Updated 3 years ago
- A curated list of free, tested proxies by EbraSha — updated every 10 minutes for maximum availability and freedom. Also on Telegram: http…☆26Updated this week
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- X-fucknet is the best tool with full power to carry out DDOS attacks {Distributed Denial of Service}☆12Oct 16, 2025Updated 5 months ago
- simplest http flooder (ddos / cc website attack) in golang, TLS(https) support, keep-alive connection abuse, http proxy support, custom r…☆12Jul 18, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SentinelaNet é uma CNC (Comando e Controle) em Python, projetada para gerenciar um malware que realiza ataques de disparos em massa (DDoS…☆11Feb 16, 2026Updated last month
- HTTP-BROWSER layer 7 attack method bypassing Cloudflare JS Challenges and HTTP-DDOS ruleset.☆11Jan 30, 2024Updated 2 years ago
- ☆11Sep 5, 2019Updated 6 years ago
- Ivanti EPM SQL Injection Remote Code Execution Vulnerability☆26Jun 12, 2024Updated last year
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- PoC☆12Apr 7, 2025Updated 11 months ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon dll.☆15Oct 7, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A curated list of Hardware Hacking resources☆12Apr 14, 2020Updated 5 years ago
- Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)☆94Apr 2, 2025Updated 11 months ago
- Writeups for ECSC 2019 National Phase☆10Jun 5, 2019Updated 6 years ago
- 💣 HTTP Flood based on AsyncIO☆13Apr 6, 2022Updated 3 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆16May 16, 2024Updated last year
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- A Python library and set of scripts to create labelled audio datasets from raw audio files and use them to train sound detection models.☆44Mar 6, 2025Updated last year
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- kerberos in rust for fun and profit☆67Mar 13, 2026Updated 2 weeks ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- ☆18Jan 22, 2026Updated 2 months ago
- Executes distributed denial-of-service attacks on websites/IPs☆22Aug 1, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆44Oct 9, 2024Updated last year
- Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12☆13Aug 12, 2024Updated last year
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- DDoS Attack☆19Aug 19, 2023Updated 2 years ago
- programmatic control of the mouse☆16Jun 28, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- ☆13Apr 14, 2024Updated last year
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15Mar 3, 2026Updated 3 weeks ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆15Aug 21, 2024Updated last year
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- ☆13Aug 17, 2025Updated 7 months ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year