CVE-2025-33053 Proof Of Concept (PoC)
☆63Jun 17, 2025Updated 10 months ago
Alternatives and similar repositories for CVE-2025-33053-Proof-Of-Concept
Users that are interested in CVE-2025-33053-Proof-Of-Concept are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆66May 31, 2025Updated 10 months ago
- POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interact…☆52Oct 16, 2025Updated 6 months ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆255Mar 26, 2026Updated 3 weeks ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Nov 2, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆54May 31, 2025Updated 10 months ago
- Indirect-Shellcode-Executor expoits the miss-configuration/vulnerability present on the API Windows method ReadProcessMemory discovered b…☆85Nov 15, 2025Updated 5 months ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆18Apr 17, 2024Updated 2 years ago
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆53May 5, 2025Updated 11 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 3 months ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated 2 years ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆121Dec 7, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 5 months ago
- A self-hosted Armory implementation.☆24Jan 1, 2026Updated 3 months ago
- Shellcode injection using the Windows Debugging API☆178Jan 4, 2026Updated 3 months ago
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆143Nov 3, 2025Updated 5 months ago
- ☆26Nov 7, 2023Updated 2 years ago
- Rust crate to parse user-mode minidump files generated on Windows☆18Nov 17, 2025Updated 5 months ago
- Templates for developing your own listeners and agents for AdaptixC2.☆49Feb 28, 2026Updated last month
- ☆41Feb 20, 2025Updated last year
- A tool to play with scheduled tasks on Windows, in Rust☆122Nov 1, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 7 months ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆106Jan 9, 2026Updated 3 months ago
- Impacket☆50Feb 25, 2026Updated last month
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆11Jun 19, 2024Updated last year
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- ☆42Mar 12, 2025Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated last year
- Load various payload (DLL from memory, Exe, etc...) in a way to evade static analysis of Antivirus. It can fetch data from various method…☆22Apr 13, 2026Updated last week
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- Run shellcode via EnumDesktopsA. C++ implementation☆13Jun 27, 2022Updated 3 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 4 months ago
- ☆86May 15, 2025Updated 11 months ago
- ☆31Aug 13, 2025Updated 8 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago