DevBuiHieu / CVE-2025-33053-Proof-Of-ConceptLinks
CVE-2025-33053 Proof Of Concept (PoC)
☆61Updated 5 months ago
Alternatives and similar repositories for CVE-2025-33053-Proof-Of-Concept
Users that are interested in CVE-2025-33053-Proof-Of-Concept are comparing it to the libraries listed below
Sorting:
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆119Updated 5 months ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆139Updated last year
- Convert your shellcode into an ASCII string☆125Updated 5 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- A Mythic agent for Windows written in C☆140Updated 2 weeks ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆156Updated last month
- ☆152Updated 7 months ago
- Enumerate active EDR's on the system☆146Updated 2 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆151Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆152Updated 4 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆76Updated last year
- ☆86Updated 6 months ago
- Abuse leaked token handles.☆133Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Updated 9 months ago
- Extract SAM and SYSTEM using Volume Shadow Copy (VSS) API. With multiple exfiltration options and XOR obfuscation☆194Updated 2 weeks ago
- Lateral Movement☆125Updated 2 years ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆62Updated 6 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆126Updated last year
- Remote DLL Injection with Timer-based Shellcode Execution☆151Updated 4 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Updated 9 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆62Updated 11 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆99Updated 4 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated 2 years ago
- Dump processes over WMI with MSFT_MTProcess☆79Updated 2 months ago
- Lateral movement with DCOM DLL hijacking☆173Updated 5 months ago
- Adversary Emulation Framework☆126Updated 5 months ago
- Stage 0☆165Updated 11 months ago
- Port of Cobalt Strike's Process Inject Kit☆189Updated last year