A scanner for the FortiNet vulnerability CVE-2025-64446
☆29Nov 18, 2025Updated 3 months ago
Alternatives and similar repositories for CVE-2025-64446
Users that are interested in CVE-2025-64446 are comparing it to the libraries listed below
Sorting:
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- ☆55Nov 18, 2025Updated 3 months ago
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Jun 16, 2023Updated 2 years ago
- ☆13Aug 5, 2025Updated 6 months ago
- A Qemu Proxmox Template builder project using Packer☆72Dec 5, 2025Updated 2 months ago
- ☆25Jan 19, 2026Updated last month
- AI-powered bug hunter - vscode plugin.☆37Sep 15, 2024Updated last year
- This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing grea…☆13Aug 31, 2023Updated 2 years ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 10 months ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- ☆12Jul 14, 2025Updated 7 months ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated 2 weeks ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- ☆94Jan 16, 2025Updated last year
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- FortiWeb CVE-2025-25257 exploit☆64Jul 11, 2025Updated 7 months ago
- This script is intended to automate your reconnaissance process in an organized fashion☆39Aug 5, 2019Updated 6 years ago
- Magic Mirror module - Display public transport in Stockholm/Sweden.☆11Feb 23, 2024Updated 2 years ago
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- ☆13Mar 6, 2025Updated 11 months ago
- Generates conditions to find methods in CakePHP from a search form.☆26Dec 26, 2013Updated 12 years ago
- Enhanced-PsExec the GUI edition☆13Sep 8, 2021Updated 4 years ago
- Read a .TLScan file containing the PCIe Configuration Space and Generate a Write Mask☆11Sep 10, 2024Updated last year
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- Chrome Extensions Dataset☆10Updated this week
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Burp extension for processing requests and responses with Python.☆10Jun 19, 2018Updated 7 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago