saladandonionrings / cve-2019-6693
An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files and all non-administator passwords, private keys and High Availability passwords.
☆15Updated last year
Alternatives and similar repositories for cve-2019-6693:
Users that are interested in cve-2019-6693 are comparing it to the libraries listed below
- some sploits☆17Updated 5 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆32Updated 9 months ago
- ☆58Updated 11 months ago
- ysoserial.net docker image☆28Updated 5 months ago
- Malware Analysis tools☆25Updated 5 months ago
- ☆26Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- ☆18Updated 11 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 3 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆38Updated last month
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆39Updated 8 months ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- Use WordPress pingback.ping to transfer files.☆16Updated last year
- This repository contains a list of python scripts to work with Microsoft RPC for research purposes.☆45Updated last month
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆22Updated last month
- An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to …☆21Updated last year
- ☆41Updated 7 months ago
- Remotely dump NT hashes through Windows Crash dumps☆26Updated 4 months ago
- A collection of various exploits☆27Updated 5 months ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Dumping credentials through windbg and pykd☆40Updated last year
- ☆18Updated last month
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆36Updated 6 months ago
- ☆14Updated last year
- Analysis of the vulnerability☆49Updated last year