This is a POC for the Fortigate OS Backdoor found in version 4.x up to 5.0.7
☆28Jan 13, 2016Updated 10 years ago
Alternatives and similar repositories for Fortigate-RCE-Backdoor
Users that are interested in Fortigate-RCE-Backdoor are comparing it to the libraries listed below
Sorting:
- POC MS15-034☆33Apr 28, 2015Updated 10 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆12Jun 18, 2018Updated 7 years ago
- Pemburu AKA GoldDigger.☆71Feb 20, 2020Updated 6 years ago
- 基于HoneyPy可视化蜜罐,visualization Honeypot based on HoneyPy☆16Mar 23, 2017Updated 8 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- Web-based WiFi monitor☆68Oct 18, 2022Updated 3 years ago
- Dynamips-GDB-Mod is a patch to the Dynamips Cisco IOS emulator which facilitates debugging and reverse engineering process of Cisco IOS.☆33Mar 13, 2013Updated 12 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆27Nov 28, 2021Updated 4 years ago
- بوت الاذكار ومواقيت الصلاة☆10Aug 27, 2022Updated 3 years ago
- ☆10Mar 19, 2019Updated 6 years ago
- RIG Exploit Kit (front end)☆30Feb 25, 2015Updated 11 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Jan 20, 2017Updated 9 years ago
- Advanced extra high speed deep packet inspect library with private AFDL language supported☆11Jul 29, 2018Updated 7 years ago
- PokeDexApp☆10Oct 24, 2025Updated 4 months ago
- ☆14Mar 28, 2014Updated 11 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- Pure-Perl OpenPGP implementation☆18Jul 28, 2017Updated 8 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 10 years ago
- Windows (32bit) agent driver☆35Jul 6, 2015Updated 10 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago
- External Radar Cheat for Counter-Strike: Source on Linux☆10Jun 13, 2013Updated 12 years ago
- Estimate how long it takes to read a text☆12Sep 6, 2025Updated 5 months ago
- هذا المستودع هي محاولة منا لاثراء المحتوي العربي بخصوص البج بونتي ومايحتويه من انواع ثغرات الي تقنيات مختلفة الي مصادر متعددة☆38Apr 26, 2022Updated 3 years ago
- hexdumpmem is hexdump-like tool to dump memory and write memory. When developing a system on a SoC, I usually need to dump or write memor…☆11Jun 28, 2022Updated 3 years ago
- learn the basics of gulp☆10Aug 17, 2015Updated 10 years ago
- This is a bat file to update and change the registry values for iMyFone AnyTo to essentially reset the trial limit back to 1 every time.☆19Jan 12, 2025Updated last year
- Web Information Gathering☆18Feb 23, 2015Updated 11 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- ☆12Feb 9, 2026Updated 2 weeks ago
- Automation of KNOXSS extension.☆11Apr 12, 2019Updated 6 years ago
- Reverse engineering the Github websocket API - alive.github.com☆14Apr 19, 2023Updated 2 years ago
- ☆10May 12, 2017Updated 8 years ago
- A memory scanning tool which uses mach_vm* to either dump memory or look for a specific sequence of bytes.☆94Apr 18, 2017Updated 8 years ago
- JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox☆44Jun 6, 2019Updated 6 years ago