CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution
☆31Jan 13, 2026Updated last month
Alternatives and similar repositories for CVE-2025-64155
Users that are interested in CVE-2025-64155 are comparing it to the libraries listed below
Sorting:
- ☆20Sep 6, 2025Updated 6 months ago
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆75Feb 27, 2026Updated last week
- sideloading PoC using onedrive.exe & version.dll☆92Oct 30, 2025Updated 4 months ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 3 weeks ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 4 months ago
- Proof of concept for Kerberos Armoring abuse.☆82Dec 12, 2025Updated 2 months ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Nov 13, 2023Updated 2 years ago
- ☆14Feb 6, 2026Updated last month
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Automated management of ad campaigns in Google Display&Video 360.☆14Feb 9, 2026Updated last month
- Baldur's Gate 3 Ultimate Tool for Amateurs Modders☆11Updated this week
- A Chrome extension that generates binaural beats.☆23Aug 23, 2023Updated 2 years ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- A secrets manager in times of crypto coins.☆11Dec 22, 2025Updated 2 months ago
- KQL queries for Microsoft Defender Advanced Hunting organized around the TTPs of the MITRE ATT&CK framework.☆18Nov 7, 2024Updated last year
- OGhidra bridges Large Language Models (LLMs) via Ollama with the Ghidra reverse engineering platform, enabling AI-driven binary analysis …☆120Updated this week
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- This AppEngine sample application is designed to process your Waze CCP JSON Feed into; BigQuery GIS tables for analysis, Google Cloud Sto…☆11Dec 12, 2023Updated 2 years ago
- ☆10May 12, 2022Updated 3 years ago
- CVE-2024-40711-exp☆42Oct 17, 2024Updated last year
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆27Feb 4, 2026Updated last month
- Creating a NIDS based on a Deep Neural Network (CNN)☆11Dec 31, 2018Updated 7 years ago
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 9 months ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago
- A simple server to act as a Veeam "honeypot" providing alerting for network scans for Veeam services☆15Aug 31, 2025Updated 6 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- MultiEx provides you a fast and easy way to obfuscate your program with many ConfuserEx Mods.☆10Jun 15, 2021Updated 4 years ago
- Fournir des ressources actionables de sécurité pour les services biomédicaux.☆11Mar 15, 2020Updated 5 years ago