This script allows you to exploit multiple targets of vulnerable PAN-OS Firewalls using a CSV file. Below are the instructions for formatting the CSV file correctly:
62
+
63
+
### CSV File Format:
64
+
The CSV file should have three columns:
65
+
66
+
ipaddress: The IP address of the vulnerable PAN-OS Firewall.
67
+
payload: The payload to execute on the firewall.
68
+
path/to/root_CA_certificate.pem: The path to the root CA certificate (leave blank if certificate verification is disabled).