bughuntar / CVE-2025-5777View external linksLinks
CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)
☆30Jul 11, 2025Updated 7 months ago
Alternatives and similar repositories for CVE-2025-5777
Users that are interested in CVE-2025-5777 are comparing it to the libraries listed below
Sorting:
- Automate the process of an S3 bucket subdomain takeover via dangling CNAME record☆26May 20, 2024Updated last year
- PoC of Imagemagick's Arbitrary File Read☆12Jul 3, 2023Updated 2 years ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 2 months ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆52Jan 11, 2025Updated last year
- A command-line tool written in Python 3 to download files from VirusTotal☆16Sep 25, 2019Updated 6 years ago
- Collection of tools to interact with Intigriti website☆16Aug 10, 2024Updated last year
- ☆18May 18, 2025Updated 8 months ago
- Orsted C2 Framework☆112Feb 9, 2026Updated last week
- An advanced utility for converting Windows Portable Executable (PE) files to position-independent code (PIC) shellcode. It enables execut…☆63Mar 1, 2025Updated 11 months ago
- A curated collection of Living off the Land (LotL) attack demonstrations where trusted binaries go rogue, because if it didn’t launch cal…☆35Jan 7, 2026Updated last month
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in☆21Dec 22, 2022Updated 3 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆39Jul 29, 2025Updated 6 months ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated 10 months ago
- Recon scripts for Red Team and Web blackbox auditing☆26Dec 29, 2025Updated last month
- Scanner for the SharePoint CVE-2025-53770 RCE zero day vulnerability.☆44Feb 10, 2026Updated last week
- Port of zentool to Windows☆27Mar 7, 2025Updated 11 months ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Jan 18, 2025Updated last year
- ☆50Jul 9, 2025Updated 7 months ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆74Aug 19, 2025Updated 5 months ago
- Have you ever wondered: what if IDA had great Ctrl+F search support for Pseudocode windows? No longer!☆73Jan 10, 2026Updated last month
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆69May 31, 2025Updated 8 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆81Jun 21, 2025Updated 7 months ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆29Oct 18, 2021Updated 4 years ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆30Apr 17, 2024Updated last year
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆130Sep 7, 2023Updated 2 years ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆116Oct 19, 2025Updated 3 months ago
- Exploits targeting vBulletin.☆75Apr 15, 2023Updated 2 years ago
- Manage user's subscriptions based on invitation.☆12Sep 25, 2023Updated 2 years ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆137Jul 2, 2025Updated 7 months ago
- ☆75Mar 16, 2025Updated 11 months ago
- Passive Web Vulnerability Detection Tool☆37May 5, 2025Updated 9 months ago
- ☆37Jan 7, 2025Updated last year
- Slides from Off-By-One Conferences☆32Sep 9, 2024Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated 11 months ago
- ☆41Mar 12, 2025Updated 11 months ago
- ☆35Jun 21, 2024Updated last year