Metasploit module for CVE-2025-24071 - Windows NTLM Hash Leak via .library-ms
☆25Mar 18, 2025Updated last year
Alternatives and similar repositories for CVE-2025-24071-msfvenom
Users that are interested in CVE-2025-24071-msfvenom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 3 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆398Mar 20, 2025Updated last year
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 7 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Impacket☆50Feb 25, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated last month
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 7 months ago
- ☆57Nov 18, 2025Updated 4 months ago
- Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)☆94Apr 2, 2025Updated 11 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088☆55Aug 18, 2025Updated 7 months ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 10 months ago
- ☆18Aug 15, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆16Dec 23, 2023Updated 2 years ago
- A automate link building tool perfect for front-end development☆13Oct 2, 2017Updated 8 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- Generate IDN homographs and phishing domains☆13Aug 21, 2023Updated 2 years ago
- crtdumper is a Go application designed to interact directly with Certificate Transparency (CT) logs servers and extract domain names fro…☆41Jun 22, 2024Updated last year
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆159Jan 3, 2026Updated 2 months ago
- PowerShell scripts for installing applications or updates via GPO.☆12Sep 24, 2015Updated 10 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆33Jan 11, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆42Sep 28, 2024Updated last year
- IPFS☆16Apr 4, 2018Updated 7 years ago
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 2 years ago
- Create your bootloader with Go.☆12May 28, 2019Updated 6 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- NVD semiupdated database to be used with CVEScannerV2☆17Mar 15, 2026Updated 2 weeks ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆25Jun 14, 2022Updated 3 years ago
- Android Jiagu unpacker - Automated DEX extraction and restoration from obfuscated APKs☆31Oct 29, 2025Updated 5 months ago
- Run Python on the Flipper Zero☆16Mar 28, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool to perform brute force attack on TPLink routers☆16Jun 12, 2019Updated 6 years ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- WMI Explorer☆92Jan 5, 2026Updated 2 months ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- ☆13Mar 23, 2024Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆80Nov 18, 2024Updated last year
- PHP DDoS/Stress Test☆11Feb 7, 2026Updated last month