CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File
☆403Mar 20, 2025Updated last year
Alternatives and similar repositories for CVE-2025-24071_PoC
Users that are interested in CVE-2025-24071_PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆200Mar 28, 2025Updated last year
- ☆235Oct 8, 2024Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆260Aug 13, 2024Updated last year
- Proof of concept & details for CVE-2025-21298☆198Jan 20, 2025Updated last year
- Complete list of LPE exploits for Windows (starting from 2023)☆925Apr 11, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆233Apr 12, 2025Updated last year
- Generate an Alphabetical Polymorphic Shellcode☆139Aug 19, 2025Updated 8 months ago
- Metasploit module for CVE-2025-24071 - Windows NTLM Hash Leak via .library-ms☆25Mar 18, 2025Updated last year
- Windows rootkit designed to work with BYOVD exploits☆218Jan 18, 2025Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆152Mar 26, 2025Updated last year
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆44Jan 9, 2025Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- ☆247May 19, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆165May 5, 2025Updated 11 months ago
- Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)☆95Apr 2, 2025Updated last year
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆515Jan 2, 2025Updated last year
- ☆158Dec 13, 2024Updated last year
- POC exploit for CVE-2024-49138☆268Feb 14, 2025Updated last year
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆274Jun 18, 2025Updated 10 months ago
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 11 months ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆359Mar 17, 2026Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- ☆59Nov 18, 2024Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆186Mar 14, 2025Updated last year
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆154Mar 6, 2025Updated last year
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- ☆39Feb 26, 2025Updated last year
- COM ViewLogger — new malware keylogging technique☆407Jan 6, 2025Updated last year
- This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).☆249Mar 26, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PoC Exploit for the NTLM reflection SMB flaw.☆690Feb 18, 2026Updated 2 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆204Apr 21, 2025Updated 11 months ago
- ☆52Mar 30, 2026Updated 2 weeks ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆234Feb 12, 2025Updated last year
- CVE-2025-1974☆90Apr 2, 2025Updated last year
- ☆127Sep 1, 2024Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year