| anasbousselham/fortiscan |
153 |
|
0 |
0 |
almost 3 years ago |
0 |
|
4 |
|
Go |
| A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool. |
| VerSprite/research |
145 |
|
0 |
0 |
about 3 years ago |
0 |
|
0 |
|
JavaScript |
| VerSprite Security Research |
| shelld3v/PwnVPN |
64 |
|
0 |
0 |
over 4 years ago |
0 |
|
0 |
|
Python |
| The best exploitation tool for SSL VPN 0day vulnerabilities. |
| 7Elements/Fortigate |
23 |
|
0 |
0 |
about 4 years ago |
0 |
|
0 |
gpl-3.0 |
Python |
| Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384) |
| li-xin-yi/seedlab |
17 |
|
0 |
0 |
over 5 years ago |
0 |
|
1 |
mit |
C |
| Records & Reports for Seed-project |
| antoniaklja/kubewire |
15 |
|
0 |
0 |
over 8 years ago |
0 |
|
1 |
gpl-2.0 |
Shell |
| Self hosted and scalable VPN for Kubernetes |
| gquere/PulseSecure_session_hijacking |
12 |
|
0 |
0 |
over 6 years ago |
0 |
|
0 |
|
|
| Attacking and defending web and VPN session hijacking in Pulse Secure Connect |
| Zeop-CyberSec/fortios_vpnssl_traversal_leak |
5 |
|
0 |
0 |
about 5 years ago |
0 |
|
0 |
|
Ruby |
| This module massively scan and exploit a path traversal vulnerability in the FortiOS SSL VPN web portal may allow an unauthenticated attacker to download FortiOS system files through specially crafted HTTP resource requests (CVE-2018-13379). |