This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.
☆154Mar 6, 2025Updated last year
Alternatives and similar repositories for 7-Zip-CVE-2025-0411-POC
Users that are interested in 7-Zip-CVE-2025-0411-POC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆519Jan 2, 2025Updated last year
- POC exploit for CVE-2024-49138☆268Feb 14, 2025Updated last year
- ☆19Dec 18, 2024Updated last year
- POC of GITHUB simple C2 in rust☆54Jul 27, 2025Updated 9 months ago
- ☆52Mar 30, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆132Jan 23, 2025Updated last year
- BOF with Synthetic Stackframe☆244Oct 30, 2025Updated 6 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆402Mar 20, 2025Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆210Dec 25, 2024Updated last year
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 9 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆154Apr 18, 2025Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 10 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated last year
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated last year
- Windows rootkit designed to work with BYOVD exploits☆219Jan 18, 2025Updated last year
- ForsHops☆154Mar 25, 2025Updated last year
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆269Apr 8, 2025Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- Our Tips&Tricks☆150Mar 4, 2026Updated 2 months ago
- early cascade injection PoC based on Outflanks blog post☆241Nov 7, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Adversary Emulation Framework☆130Jul 1, 2025Updated 10 months ago
- Utilizng an MCP Server to communicate with your C2☆91May 15, 2025Updated 11 months ago
- Shellcode loader that executes embedded Lua from Rust.☆125Dec 16, 2024Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆465Nov 2, 2024Updated last year
- ☆31May 16, 2024Updated last year
- ☆26Aug 11, 2025Updated 8 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆286Sep 18, 2024Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆258Sep 8, 2024Updated last year
- A Reflective Loader for macOS☆149Jul 20, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A cross-platform tool to parse and describe the contents of a raw ntSecurityDescriptor structure☆49Oct 4, 2025Updated 7 months ago
- ☆12Nov 12, 2023Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆78Mar 13, 2024Updated 2 years ago
- remote process injections using pool party techniques☆71Jun 29, 2025Updated 10 months ago
- ☆148Oct 29, 2024Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year