Esonhugh / ingressNightmare-CVE-2025-1974-expsLinks
IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available.
☆75Updated last month
Alternatives and similar repositories for ingressNightmare-CVE-2025-1974-exps
Users that are interested in ingressNightmare-CVE-2025-1974-exps are comparing it to the libraries listed below
Sorting:
- The Poc for CVE-2024-20931☆73Updated last year
- ☆49Updated 2 months ago
- proxy/tunnel everything for red team!☆169Updated last week
- impacket编程手册☆104Updated last year
- Zerologon exploit with restore DC password automatically☆136Updated last year
- Apache Solr Backup/Restore APIs RCE Poc (CVE-2023-50386)☆64Updated last year
- If you only have hash, you can still operate exchange☆74Updated 3 years ago
- Java JNI HellsGate/HalosGate/TartarusGate/RecycledGate/SSN Syscall/Many Shellcode Loaders☆196Updated last year
- POC for RCE using vulnerabilities described in VMSA-2023-0001☆149Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆88Updated 2 years ago
- Take a screenshot without injection for Cobalt Strike☆190Updated last year
- Binary Hollowing☆76Updated 8 months ago
- 主要用于隐藏进程真实路径,进程带windows真签名☆111Updated 7 months ago
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆178Updated 8 months ago
- Cobalt Strike BOF that Add a user to localgroup by samr☆129Updated 2 years ago
- ☆13Updated last year
- mssqlproxy python3.5+ 并修复bug☆63Updated 2 years ago
- Go implementation of the self-deletion of an running executable from disk☆108Updated 2 years ago
- C2 redirector base on caddy☆204Updated last year
- Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellco…☆39Updated 7 months ago
- ☆34Updated 2 years ago
- ASPX ShellCode Loader☆50Updated last year
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆39Updated 9 months ago
- 一款基于James Forshaw的.NET Remoting反序列化工具升级版在TypeFilterLevel.Low模式无文件payload任意代码执行poc的开发心得☆47Updated 4 months ago
- 通过websocket在IIS8(Windows Server 2012)以上实现socks5代理☆89Updated last year
- Cobalt Strike BOF that Add an admin user☆73Updated 2 years ago
- This is a third party agent for Havoc C2 written in golang.☆58Updated last year
- 使用 rust 实现 CobaltStrike 的 beacon || Using Rust to implement CobaltStrike's Beacon☆130Updated 3 months ago
- Shellcode Reductio Entropy Tools☆67Updated last year
- Silently Install Chrome Extension For Persistence☆51Updated 10 months ago