An open API service indexing awesome lists of open source software.

https://github.com/aqhmal/pulsexploit

Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.
https://github.com/aqhmal/pulsexploit

exploit information-extraction infosec offset pentest-script python3

Last synced: about 2 months ago
JSON representation

Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.

Awesome Lists containing this project

README

        

# pulsexploit
Automated script for Pulse Secure SSL VPN exploit ([CVE-2019-11510](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11510 "CVE 2019-11510")) using hosts retrieved from Shodan API. You must have a Shodan account to use this script. Click [here](https://account.shodan.io/register) if you don't have Shodan account.

![image](https://user-images.githubusercontent.com/22043590/70325539-29340b80-186d-11ea-8d28-7c1573e92c5e.png)

## Installation

1. Install dependencies.
```bash
# CentOS & Fedora
yum install git python3 -y

# Ubuntu & Debian
apt install git python3 python3-pip -y

# FreeBSD
pkg install -y python3 git
python3 -m ensurepip
```

2. Clone repository & install python3 module
```bash
git clone https://github.com/aqhmal/pulsexploit.git
cd pulsexploit
pip3 install -r requirements.txt
```

3. Add your Shodan API key and edit the search query
```python
# Shodan API Key (change according to your Shodan API key)
api_key = ''
# Shodan search query (edit this, but don't remove the html and port)
search_query = 'html:"/dana/" port:"443"'
```

## Usage

```bash
python3 pulsexploit.py -t
```

## Disclaimer
This script is only for penetration testing and security research, I will not be responsible if you use it for illegal activities.