This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
☆154Mar 6, 2025Updated last year
Alternatives and similar repositories for 7-Zip-CVE-2025-0411-POC
Users that are interested in 7-Zip-CVE-2025-0411-POC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- POC exploit for CVE-2024-49138☆268Feb 14, 2025Updated last year
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆515Jan 2, 2025Updated last year
- ☆19Dec 18, 2024Updated last year
- POC of GITHUB simple C2 in rust☆52Jul 27, 2025Updated 8 months ago
- ☆53Sep 23, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆128Jan 23, 2025Updated last year
- BOF with Synthetic Stackframe☆235Oct 30, 2025Updated 4 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆398Mar 20, 2025Updated last year
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.☆27Apr 21, 2025Updated 11 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆151Apr 18, 2025Updated 11 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated 11 months ago
- Windows rootkit designed to work with BYOVD exploits☆218Jan 18, 2025Updated last year
- ForsHops☆153Mar 25, 2025Updated last year
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆268Apr 8, 2025Updated 11 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- Our Tips&Tricks☆148Mar 4, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- early cascade injection PoC based on Outflanks blog post☆240Nov 7, 2024Updated last year
- Utilizng an MCP Server to communicate with your C2☆89May 15, 2025Updated 10 months ago
- Adversary Emulation Framework☆129Jul 1, 2025Updated 8 months ago
- Shellcode loader that executes embedded Lua from Rust.☆127Dec 16, 2024Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆465Nov 2, 2024Updated last year
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆48Oct 4, 2025Updated 5 months ago
- ☆31May 16, 2024Updated last year
- ☆26Aug 11, 2025Updated 7 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A set of programs for analyzing common vulnerabilities in COM☆249Sep 8, 2024Updated last year
- A Reflective Loader for macOS☆148Jul 20, 2025Updated 8 months ago
- ☆12Nov 12, 2023Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆207Mar 6, 2025Updated last year
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 9 months ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Mar 13, 2024Updated 2 years ago