This is a POC for the Fortigate OS Backdoor found in version 4.x up to 5.0.7
☆28Jan 13, 2016Updated 10 years ago
Alternatives and similar repositories for Fortigate-RCE-Backdoor
Users that are interested in Fortigate-RCE-Backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC MS15-034☆33Apr 28, 2015Updated 11 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- Pemburu AKA GoldDigger.☆71Feb 20, 2020Updated 6 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆12Jun 18, 2018Updated 7 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Create lists from nmap output.☆13Jan 27, 2021Updated 5 years ago
- Web-based WiFi monitor☆68Oct 18, 2022Updated 3 years ago
- Dynamips-GDB-Mod is a patch to the Dynamips Cisco IOS emulator which facilitates debugging and reverse engineering process of Cisco IOS.☆33Mar 13, 2013Updated 13 years ago
- nmap - unofficial git fork☆19Aug 2, 2017Updated 8 years ago
- ☆12Mar 9, 2026Updated 2 months ago
- Windows Malware☆39Apr 17, 2013Updated 13 years ago
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- OctoDNS – DNS as code – bundled as Docker images☆14Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- send raw PDU SMS from your computer using a HTC Android phone☆30Sep 1, 2015Updated 10 years ago
- ☆10May 12, 2017Updated 9 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆21Mar 16, 2018Updated 8 years ago
- WebPwn3r - Web Applications Security Scanner.☆458Dec 9, 2021Updated 4 years ago
- Large Scale Cumulative Binary Diffing.☆25Mar 10, 2018Updated 8 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- Code-base to go with academic paper "REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic" available @ https://pure.qub.a…☆17Aug 10, 2022Updated 3 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Web Information Gathering☆18Feb 23, 2015Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆16May 9, 2016Updated 10 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- Automation of KNOXSS extension.☆11Apr 12, 2019Updated 7 years ago
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆28Nov 28, 2021Updated 4 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- بوت الاذكار ومواقيت الصلاة☆10Aug 27, 2022Updated 3 years ago
- Pure-Perl OpenPGP implementation☆18Jul 28, 2017Updated 8 years ago
- CVE-2024-28995 POC Vulnerability Scanner☆14Jun 15, 2024Updated last year
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Module for Xposed framework to allow sending of raw SMS PDUs☆21Nov 15, 2014Updated 11 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- A library to assist in security-testing Unicode enabled applications during fuzzing, XSS, SQLi, etc.☆42Jul 1, 2017Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆59Jun 26, 2015Updated 10 years ago
- [FIC] Legislación y Seguridad Informática☆11Mar 3, 2014Updated 12 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- ☆10Jul 24, 2017Updated 8 years ago