CVE-2025-49144 PoC for security researchers to test and try.
☆86Jun 30, 2025Updated 10 months ago
Alternatives and similar repositories for CVE-2025-49144_PoC
Users that are interested in CVE-2025-49144_PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆402Mar 20, 2025Updated last year
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Super light, super fast, unlimited search idea☆25Aug 3, 2025Updated 9 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 10 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆97Jul 10, 2025Updated 9 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- Indicator of Compromise Scanner for CVE-2019-19781☆58Mar 25, 2020Updated 6 years ago
- Generate an Alphabetical Polymorphic Shellcode☆140Aug 19, 2025Updated 8 months ago
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆40Jan 23, 2026Updated 3 months ago
- Enhance your Google account security with this comprehensive guide. It covers strong passwords, two-factor authentication, phishing preve…☆11Nov 21, 2024Updated last year
- DoS Attacks on Bluetooth Devices for pentest purposes☆35Nov 22, 2025Updated 5 months ago
- XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characte…☆53Jan 16, 2026Updated 3 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Umbrella will protect your shellcode from the rain.☆30Jun 4, 2025Updated 11 months ago
- ☆29Jun 18, 2025Updated 10 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆77Jul 29, 2025Updated 9 months ago
- A comprehensive, step-by-step guide for hardening your X (formerly Twitter) account security. Includes detailed instructions for 2FA, pas…☆12Mar 8, 2025Updated last year
- CVE-2025-1974☆90Apr 2, 2025Updated last year
- CVE-2025-4123 - Grafana Tool☆32Jun 4, 2025Updated 11 months ago
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆55Aug 9, 2025Updated 9 months ago
- ☆200Mar 28, 2025Updated last year
- Repository of various scripts related to Mobile PT. Copyrights and Licensing terms belong to respective owners.☆12Nov 4, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆171Jun 29, 2025Updated 10 months ago
- Pre-Auth Exploit for CVE-2024-40711☆54Sep 15, 2024Updated last year
- SilverTGOSINT is a Telegram OSINT tool that collects messages from target users in Telegram groups and tracks users who extract data from…☆53May 1, 2025Updated last year
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆519Jan 2, 2025Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Stealer malware written in C++☆15Sep 7, 2024Updated last year
- ShadowDigger: A Python CLI tool for SQLite DB management and doxing. It allows data creation, insertion, and querying, catering to doxing…☆10Jul 9, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆63Apr 13, 2025Updated last year
- Change the entry point of Windows PE file and inject a dynamic library, in order to crack software of fix games.☆10Jun 11, 2021Updated 4 years ago
- ☆18Sep 27, 2025Updated 7 months ago
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- AI-Driven Breach and Attack Simulation Tool (Initial Proof of Concept for AI Pentest Copilot)☆27Jan 6, 2025Updated last year
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- VulnReach builds on standard SCA output by adding reachability context - proving through static analysis, taint tracking, and live runtim…☆20Apr 27, 2026Updated last week