absholi7ly / CVE-2025-0282-Ivanti-exploitLinks
CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.
☆49Updated 10 months ago
Alternatives and similar repositories for CVE-2025-0282-Ivanti-exploit
Users that are interested in CVE-2025-0282-Ivanti-exploit are comparing it to the libraries listed below
Sorting:
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Updated last year
- Proof-of-concept exploit for CVE-2024-25153.☆42Updated last year
- Go Shellcode Loader to be Integrated in Exploration C2☆28Updated 9 months ago
- WSUS Unauthenticated RCE☆152Updated 2 weeks ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- Winsocket for Cobalt Strike.☆101Updated 2 years ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆100Updated 5 months ago
- PAN-OS auth bypass + RCE☆47Updated 11 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆61Updated 5 months ago
- CVE-2024-40711-exp☆42Updated last year
- ☆68Updated 9 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆151Updated last year
- We found a way to DLL sideload with cleanmgr.exe☆95Updated 8 months ago
- ☆89Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Updated 2 years ago
- A C# port from Invoke-GhostTask☆118Updated last year
- Terminate AV/EDR leveraging BYOVD attack☆101Updated 7 months ago
- ☆67Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- command control framework☆27Updated last week
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆225Updated last year
- Abuse leaked token handles.☆133Updated last year
- Exploit for the CVE-2024-5806☆45Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆59Updated 8 months ago
- To audit the security of read-only domain controllers☆118Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆61Updated 10 months ago
- ☆39Updated 8 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆53Updated 6 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆118Updated 4 months ago
- ☆58Updated last year