Skip to content

Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.

License

aqhmal/pulsexploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

pulsexploit

Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script. Click here if you don't have Shodan account.

image

Installation

  1. Install dependencies.
    # CentOS & Fedora
    yum install git python3 -y

    # Ubuntu & Debian
    apt install git python3 python3-pip -y

    # FreeBSD
    pkg install -y python3 git
    python3 -m ensurepip
  1. Clone repository & install python3 module
    git clone https://github.com/aqhmal/pulsexploit.git
    cd pulsexploit
    pip3 install -r requirements.txt
  1. Add your Shodan API key and edit the search query
    # Shodan API Key (change according to your Shodan API key)
    api_key = ''
    # Shodan search query (edit this, but don't remove the html and port)
    search_query = 'html:"/dana/" port:"443"'

Usage

    python3 pulsexploit.py -t <number of threads/ default: 5>

Disclaimer

This script is only for penetration testing and security research, I will not be responsible if you use it for illegal activities.

About

Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages