Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager
☆15Jan 21, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-2022-40684-POC
Users that are interested in CVE-2022-40684-POC are comparing it to the libraries listed below
Sorting:
- CVE-2022-41040 - Server Side Request Forgery (SSRF) in Microsoft Exchange Server☆91Jan 21, 2023Updated 3 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆56Dec 29, 2023Updated 2 years ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- HuntersEye is designed for Bug Bounty Hunters, and Security Researchers to monitor new subdomains and certificates for specified domains.…☆21Dec 29, 2023Updated 2 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- Registry hive parsing the async way☆25Oct 29, 2025Updated 4 months ago
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- CVE-2022-42889 aka Text4Shell research & PoC☆20Mar 17, 2023Updated 2 years ago
- ☆12Oct 10, 2023Updated 2 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- ☆33Jan 3, 2023Updated 3 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year
- Shiva is a programmable dynamic linker for loading ELF microprograms☆35Sep 4, 2023Updated 2 years ago
- This repository is for code and documentation for Badge Engine, a Digital Promise technology☆18Dec 22, 2025Updated 2 months ago
- aws cli pentesting/red team snippets☆32Jan 12, 2024Updated 2 years ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- Combine words from two wordlist files and concatenate them with an optional delimiter☆38Sep 25, 2023Updated 2 years ago
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆87Oct 13, 2022Updated 3 years ago
- ☆12Jul 4, 2024Updated last year
- ☆10Mar 6, 2023Updated 3 years ago
- This tool is a simple ffuf launcher which lets you select dynamically which wordlist and which extentions you want to fuzz.☆10Sep 10, 2025Updated 5 months ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 9 months ago
- ☆10Mar 11, 2024Updated last year
- Some of my crypto challenges☆11Jun 21, 2020Updated 5 years ago
- nuclei scanner for proxyshell ( CVE-2021-34473 )☆47Oct 9, 2022Updated 3 years ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆10May 12, 2022Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- CVE-2022-39197 RCE POC☆13Oct 22, 2022Updated 3 years ago
- ☆18Jan 26, 2026Updated last month
- ☆16Dec 7, 2025Updated 3 months ago
- Multi-spectrum Analysis Tool for Spectroscopy☆16May 9, 2025Updated 9 months ago
- ☆12Dec 16, 2022Updated 3 years ago
- Exploits for TRENDNet routers☆13Apr 21, 2020Updated 5 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发☆15Nov 1, 2022Updated 3 years ago