bughuntar / CVE-2025-5777Links
CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)
☆28Updated 5 months ago
Alternatives and similar repositories for CVE-2025-5777
Users that are interested in CVE-2025-5777 are comparing it to the libraries listed below
Sorting:
- Proof of Concept Exploit for CVE-2024-9464☆45Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated 10 months ago
- GenZ Shellcode Generator to execute commands with winExec API☆23Updated 7 months ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆41Updated 9 months ago
- RCE through a race condition in Apache Tomcat☆56Updated 11 months ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆102Updated 5 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆47Updated 3 months ago
- Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)☆47Updated last year
- ☆59Updated last year
- Repo for all my exploits/PoCs☆53Updated 7 months ago
- Proof of Concept Exploit for CVE-2024-9465☆30Updated last year
- Proof Of Concepts☆54Updated 4 months ago
- ☆68Updated 10 months ago
- ☆38Updated 11 months ago
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆45Updated 5 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆24Updated last year
- List of some AD tools I frequently use☆53Updated last month
- Exploit for the CVE-2024-5806☆45Updated last year
- Proof-of-concept exploit for CVE-2024-25153.☆42Updated last year
- Exploit for CVE-2024-5009☆13Updated last year
- Convert your shellcode into an ASCII string☆125Updated 5 months ago
- Exploits Unauth Docker API☆42Updated 7 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆101Updated 2 years ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆66Updated last month
- GeoServer Remote Code Execution☆84Updated 8 months ago
- ☆45Updated last month
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated 2 years ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆90Updated 3 months ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year
- ☆59Updated last year