aydinnyunus / CVE-2025-29927View external linksLinks
CVE-2025-29927 Proof of Concept
☆97Mar 23, 2025Updated 10 months ago
Alternatives and similar repositories for CVE-2025-29927
Users that are interested in CVE-2025-29927 are comparing it to the libraries listed below
Sorting:
- ☆16Dec 7, 2025Updated 2 months ago
- ☆17Jan 9, 2025Updated last year
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Sample Flutter application for Android☆10Jun 8, 2019Updated 6 years ago
- ☆19Dec 18, 2024Updated last year
- BurpSuite extension that helps find user input in a GWT body.☆12May 29, 2020Updated 5 years ago
- The iOS Reloader is a weaponizing tool for jailbroken iOS devices. It facilitates the installation of a collection of tools on iOS device…☆17Sep 15, 2025Updated 5 months ago
- Russenger: Simplify Facebook Messenger Webhooks with Rust☆16Nov 11, 2025Updated 3 months ago
- A Nuclei template to detect CVE-2025-29927 the Next.js authentication bypass vulnerability☆18Mar 23, 2025Updated 10 months ago
- a JS tool that let you take screenshot of many hosts.☆13Aug 2, 2019Updated 6 years ago
- Proof-of-Concept for Authorization Bypass in Next.js Middleware☆19Mar 23, 2025Updated 10 months ago
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated 11 months ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆43Jan 18, 2025Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- ☆96Apr 3, 2025Updated 10 months ago
- Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本☆19Apr 1, 2025Updated 10 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Social media share buttons for your next React.js, Next.js apps.☆11May 11, 2024Updated last year
- ☆23Mar 4, 2025Updated 11 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆184Mar 14, 2025Updated 11 months ago
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆61Jun 12, 2023Updated 2 years ago
- ☆97Jun 6, 2025Updated 8 months ago
- Ollama AI Analyzer runs directly on your local computer, using Ollama's AI models to analyze your HTTP requests and responses. This means…☆32Mar 1, 2025Updated 11 months ago
- Conditional Access Reporting☆29Apr 4, 2025Updated 10 months ago
- DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replicat…☆29Apr 26, 2023Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Aug 8, 2025Updated 6 months ago
- ☆31Dec 5, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- ☆32Apr 1, 2025Updated 10 months ago
- JWT秘钥爆破脚本☆30Jun 21, 2023Updated 2 years ago
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆36Jul 10, 2024Updated last year
- ☆34Apr 16, 2022Updated 3 years ago
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated 11 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆50Feb 13, 2025Updated last year
- 哔哩哔哩-API收集整理【不断更新中....】☆10Apr 25, 2025Updated 9 months ago
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- 🟩 NanoMC – A lightweight, portable Minecraft 1.8.9 build under 300MB. Runs anywhere, no install required.☆13Sep 7, 2025Updated 5 months ago