zigoo0 / Fortigate-RCE-BackdoorLinks
This is a POC for the Fortigate OS Backdoor found in version 4.x up to 5.0.7
☆28Updated 9 years ago
Alternatives and similar repositories for Fortigate-RCE-Backdoor
Users that are interested in Fortigate-RCE-Backdoor are comparing it to the libraries listed below
Sorting:
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 10 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 10 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Pentest Scripts for Apache Vulnerabilities☆31Updated 7 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 9 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 8 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- a collection of payloads for common webapps☆72Updated 12 years ago
- This repo is all about myself coded exploit codes :)☆54Updated 6 years ago
- ☆47Updated 9 years ago
- ☆35Updated 9 months ago
- ☆57Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆24Updated 7 years ago
- Operational toolset utilizing git's submodule feature☆57Updated 12 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- XSSing Your Way to Shell☆32Updated 9 years ago
- This is a Firefox WebExtension that monitors the browsing activity and automatically perform an automated XSS vulnerability scan by submi…☆19Updated 8 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 5 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- ☆54Updated 8 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- Collection of tools for privesc on Linux☆34Updated 12 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆98Updated 2 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆54Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 8 years ago
- Some wordpress user enumeration scripts.☆38Updated 8 years ago