This is a POC for the Fortigate OS Backdoor found in version 4.x up to 5.0.7
☆28Jan 13, 2016Updated 10 years ago
Alternatives and similar repositories for Fortigate-RCE-Backdoor
Users that are interested in Fortigate-RCE-Backdoor are comparing it to the libraries listed below
Sorting:
- POC MS15-034☆33Apr 28, 2015Updated 10 years ago
- Pemburu AKA GoldDigger.☆71Feb 20, 2020Updated 6 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆12Jun 18, 2018Updated 7 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Create lists from nmap output.☆13Jan 27, 2021Updated 5 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- 基于HoneyPy可视化蜜罐,visualization Honeypot based on HoneyPy☆16Mar 23, 2017Updated 8 years ago
- Dynamips-GDB-Mod is a patch to the Dynamips Cisco IOS emulator which facilitates debugging and reverse engineering process of Cisco IOS.☆33Mar 13, 2013Updated 13 years ago
- Zabbix template for Oracle databases monitoring via odbc.☆11Feb 19, 2021Updated 5 years ago
- nmap - unofficial git fork☆19Aug 2, 2017Updated 8 years ago
- ☆12Mar 9, 2026Updated last week
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- Mirror of http://rafale.org/~mattoufoutu/darkc0de.com☆13Jul 25, 2015Updated 10 years ago
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- A collection of scripts based on libclang for extracting API information from interpreters☆25Jul 10, 2012Updated 13 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆18Apr 12, 2015Updated 10 years ago
- send raw PDU SMS from your computer using a HTC Android phone☆30Sep 1, 2015Updated 10 years ago
- ☆10May 12, 2017Updated 8 years ago
- Android Testing☆16Mar 24, 2014Updated 11 years ago
- Steals Wifi For FlipperZero. Credit to " I am Jakoby"☆12Jun 11, 2023Updated 2 years ago
- Minimalistic IKEv2 (RFC 5996) implementation in Python.☆22Mar 16, 2018Updated 8 years ago
- PokeDexApp☆10Oct 24, 2025Updated 4 months ago
- Large Scale Cumulative Binary Diffing.☆25Mar 10, 2018Updated 8 years ago
- Part of the aircrack-ng (experimental version) for the WiFi Pineapples, with custom scripts.☆23Oct 19, 2020Updated 5 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- Code-base to go with academic paper "REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic" available @ https://pure.qub.a…☆16Aug 10, 2022Updated 3 years ago
- Web Information Gathering☆18Feb 23, 2015Updated 11 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- ☆16May 9, 2016Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- Automation of KNOXSS extension.☆11Apr 12, 2019Updated 6 years ago
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆27Nov 28, 2021Updated 4 years ago
- ☆29Aug 12, 2021Updated 4 years ago
- RIG Exploit Kit (front end)☆30Feb 25, 2015Updated 11 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Simple software UART for AVR microcontrollers, written in assembly☆17Jan 18, 2018Updated 8 years ago
- Pure-Perl OpenPGP implementation☆18Jul 28, 2017Updated 8 years ago
- CVE-2024-28995 POC Vulnerability Scanner☆13Jun 15, 2024Updated last year