CVE-2025-33053 Proof Of Concept (PoC)
☆63Jun 17, 2025Updated 9 months ago
Alternatives and similar repositories for CVE-2025-33053-Proof-Of-Concept
Users that are interested in CVE-2025-33053-Proof-Of-Concept are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆67May 31, 2025Updated 9 months ago
- POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interact…☆52Oct 16, 2025Updated 5 months ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆231Mar 13, 2026Updated 2 weeks ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated last month
- Prevent in-process process termination by patching exit APIs☆65Nov 9, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Nov 2, 2023Updated 2 years ago
- ☆55May 31, 2025Updated 9 months ago
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆84Nov 15, 2025Updated 4 months ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated last year
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆53May 5, 2025Updated 10 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 3 months ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 4 months ago
- A self-hosted Armory implementation.☆23Jan 1, 2026Updated 2 months ago
- Shellcode injection using the Windows Debugging API☆177Jan 4, 2026Updated 2 months ago
- abusing windows toast notifications for fun and user manipulation☆82Mar 20, 2026Updated last week
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆143Nov 3, 2025Updated 4 months ago
- ☆26Nov 7, 2023Updated 2 years ago
- Rust crate to parse user-mode minidump files generated on Windows☆18Nov 17, 2025Updated 4 months ago
- Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.☆51Oct 19, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Templates for developing your own listeners and agents for AdaptixC2.☆50Feb 28, 2026Updated last month
- ☆41Feb 20, 2025Updated last year
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated 2 months ago
- A tool to play with scheduled tasks on Windows, in Rust☆122Nov 1, 2025Updated 4 months ago
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 6 months ago
- Impacket☆50Feb 25, 2026Updated last month
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆11Jun 19, 2024Updated last year
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- ☆41Mar 12, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 11 months ago
- Load various payload (DLL from memory, Exe, etc...) in a way to evade static analysis of Antivirus. It can fetch data from various method…☆22Updated this week
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/A…☆33Jan 22, 2026Updated 2 months ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 3 months ago
- ☆86May 15, 2025Updated 10 months ago