watchtowrlabs / fortios-auth-bypass-poc-CVE-2024-55591Links
☆74Updated 10 months ago
Alternatives and similar repositories for fortios-auth-bypass-poc-CVE-2024-55591
Users that are interested in fortios-auth-bypass-poc-CVE-2024-55591 are comparing it to the libraries listed below
Sorting:
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆92Updated last year
- ☆58Updated 7 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆38Updated 8 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆172Updated 6 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- ☆101Updated 9 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 7 months ago
- PoC that downloads an executable from a public SSL certificate☆135Updated 4 months ago
- Inject RDPThief into memory with PowerShell.☆65Updated 10 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆219Updated 7 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆202Updated 2 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated 10 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆180Updated 6 months ago
- ☆62Updated last year
- List of some AD tools I frequently use☆53Updated last month
- ☆79Updated 7 months ago
- Everything and anything related to password spraying☆151Updated last year
- ☆94Updated 10 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆120Updated 5 months ago
- ☆45Updated last month
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆101Updated 2 years ago
- ☆121Updated 6 months ago
- ☆93Updated 5 months ago
- Decrypt Chromium based browser passwords with PowerShell.☆127Updated 3 weeks ago
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 5 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆74Updated last month
- A Moodle Scanner☆43Updated last year
- ☆161Updated last year
- Our Tips&Tricks☆127Updated 9 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆89Updated 3 weeks ago