kljunowsky / CVE-2022-40684-POCLinks
Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager
☆15Updated 2 years ago
Alternatives and similar repositories for CVE-2022-40684-POC
Users that are interested in CVE-2022-40684-POC are comparing it to the libraries listed below
Sorting:
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆55Updated last year
- Case for CVE-2022-30778☆23Updated 2 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960☆2Updated 3 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated 2 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 2 years ago
- Tomcat backdoor based on CS blog☆27Updated last year
- Lexmark CVE-2023-26067☆25Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Updated last year
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Updated 7 months ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- ☆28Updated 3 years ago
- CVE-2022-41040 nuclei template☆18Updated 2 years ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).☆18Updated last year
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆23Updated 6 months ago
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Updated 2 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- ☆10Updated 3 years ago
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Updated 4 years ago
- A script used to query the dehashed API and filter for more useful results☆16Updated 4 years ago
- CVE-2024-23897 jenkins-cli☆15Updated last year
- XMLRPC - RCE in MovableTypePoC☆21Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- ☆19Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated 2 years ago
- evasion of defender☆9Updated 2 years ago
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆33Updated 3 years ago