POC for CVE-2025-54918 and a technical demonstration.
☆56Jan 12, 2026Updated 2 months ago
Alternatives and similar repositories for CVE-2025-54918-POC
Users that are interested in CVE-2025-54918-POC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated last week
- A Dockerized build pipeline for custom Windows x64 shellcode☆53Dec 12, 2025Updated 3 months ago
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆35Mar 22, 2026Updated last week
- Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)☆30Mar 27, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Mar 25, 2026Updated last week
- ☆36Mar 4, 2025Updated last year
- Change hash for a signed pe☆18Jul 18, 2023Updated 2 years ago
- Proof of concept for Kerberos Armoring abuse.☆82Dec 12, 2025Updated 3 months ago
- replace the shellcode chatacters so that reduce the entropy☆18Sep 14, 2023Updated 2 years ago
- Zero-dependency MCP server implementation.☆74Updated this week
- Windows Kernel Rootkit☆63Nov 24, 2025Updated 4 months ago
- Create a lnk shortcut file for Windows☆24Apr 23, 2019Updated 6 years ago
- RPC to WebClient startup☆55Aug 19, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- command control framework☆33Mar 27, 2026Updated last week
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated 2 months ago
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- 利用RPC服务,内网批量探测Windows出网☆14Jun 24, 2022Updated 3 years ago
- ☆19Jan 25, 2024Updated 2 years ago
- ☆164Mar 20, 2026Updated 2 weeks ago
- Python tool to automatically perform SPN-less RBCD attacks.☆127Jan 7, 2026Updated 2 months ago
- PHP 8 Sandbox Escape☆78Feb 28, 2026Updated last month
- Convert .reg to registry hive and reciprocally, without elevation☆84Feb 18, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Sysmon Config Pusher - Modernized☆34Jan 7, 2026Updated 2 months ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆29Feb 4, 2026Updated last month
- Custom built Syntax Highlight tool for Word Documents☆27Sep 13, 2024Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆48Apr 7, 2025Updated 11 months ago
- ☆16Jul 1, 2024Updated last year
- Lsass dumper evading (all ?) EDR detection☆49Nov 10, 2025Updated 4 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Aug 25, 2025Updated 7 months ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 5 months ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Golang implement winrm client with pass the hash☆32Apr 29, 2024Updated last year
- ☆22Mar 6, 2026Updated 3 weeks ago
- ☆16Jun 15, 2025Updated 9 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆130Feb 17, 2026Updated last month