Yuri08loveElaina / CVE-2025-49667View external linksLinks
Windows Win32 Kernel Subsystem
☆35Aug 23, 2025Updated 5 months ago
Alternatives and similar repositories for CVE-2025-49667
Users that are interested in CVE-2025-49667 are comparing it to the libraries listed below
Sorting:
- Kernel Information Disclosure☆32Jan 13, 2026Updated last month
- ☆15Aug 12, 2024Updated last year
- ☆23Jan 27, 2026Updated 3 weeks ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- ☆21Apr 6, 2025Updated 10 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 6 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 5 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- ☆11Feb 13, 2024Updated 2 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆72Sep 8, 2025Updated 5 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Jul 29, 2025Updated 6 months ago
- ☆19Feb 21, 2025Updated 11 months ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- ☆16Jun 1, 2024Updated last year
- Proof of concept & details for CVE-2025-21298☆195Jan 20, 2025Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 8 months ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- NailaoLoader: Hiding Execution Flow via Patching☆22Feb 27, 2025Updated 11 months ago
- ☆26Aug 11, 2025Updated 6 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 4 months ago
- ☆20Nov 8, 2020Updated 5 years ago
- UAC Bypass using RequestTrace scheduled task☆23Mar 13, 2025Updated 11 months ago
- ☆24May 14, 2025Updated 9 months ago
- Hacking GraalVM Espresso - Abusing Continuation API to Make ROP-like Attack☆36Aug 27, 2025Updated 5 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Aug 23, 2025Updated 5 months ago
- Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!☆156Jun 5, 2025Updated 8 months ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆159Jun 13, 2025Updated 8 months ago
- Docker container for running CobaltStrike 4.7 and above☆24Mar 20, 2025Updated 10 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 9 months ago
- Proof-of-Concept for CVE-2024-26218☆55Apr 26, 2024Updated last year
- Microsoft Telnet Server MS-TNAP Authentication Bypass Exploit☆22Apr 28, 2025Updated 9 months ago
- Tool to obtain hash using MS-SNTP for user accounts☆28Jan 22, 2025Updated last year
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- ☆33Jan 23, 2025Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 6 months ago
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 2 years ago
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Apr 18, 2024Updated last year
- Minimalistic HTTP(S) client for the NT kernel☆62Dec 1, 2025Updated 2 months ago