POC FortiOS SSL-VPN buffer overflow vulnerability
☆27Jun 16, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-27997-POC
Users that are interested in CVE-2023-27997-POC are comparing it to the libraries listed below
Sorting:
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆134May 8, 2024Updated last year
- xortigate-cve-2023-27997☆65Oct 12, 2023Updated 2 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆29Nov 18, 2025Updated 3 months ago
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆15Apr 26, 2021Updated 4 years ago
- Proof-of-concept exploit for CVE-2024-25153.☆42Mar 13, 2024Updated last year
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- CVE-2023-22515: Confluence Broken Access Control Exploit☆149Nov 12, 2025Updated 3 months ago
- POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon☆105Mar 14, 2023Updated 2 years ago
- CVE-2023-21554 Windows MessageQueuing PoC,分析见 https://www.zoemurmure.top/posts/cve_2023_21554/☆59May 18, 2023Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Nov 22, 2025Updated 3 months ago
- Collection of Rust repos useful for Red Teamers.☆34Sep 23, 2022Updated 3 years ago
- Duplicate not owned Token from Running Process☆74Jul 21, 2023Updated 2 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆34Feb 4, 2025Updated last year
- ☆13Aug 5, 2025Updated 7 months ago
- ☆38Apr 1, 2024Updated last year
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 8 years ago
- ☆36Nov 11, 2018Updated 7 years ago
- Tools for offensive security of NetBackup infrastructures☆43Jun 6, 2023Updated 2 years ago
- Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler / Citrix ADC to CVE-2023-3519☆85Jul 23, 2023Updated 2 years ago
- AI-powered bug hunter - vscode plugin.☆37Sep 15, 2024Updated last year
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Community maintained list of most popular HIPS service and process names on a Windows Platform.☆43Jan 7, 2026Updated 2 months ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- Flexible C# shellcode runner☆39Jan 18, 2022Updated 4 years ago
- ☆14Jul 26, 2017Updated 8 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- ☆48Jul 19, 2024Updated last year
- Confluence Widget Connector RCE☆39Apr 10, 2019Updated 6 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- A fork of Gordon Henderson's git://git.drogon.net/wiringPi but with python bindings☆11Jan 2, 2017Updated 9 years ago
- SmartThings DTH for toggling the motion sensor setting on SmartCams.☆15Sep 26, 2017Updated 8 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago