Windows Network File System Remote exploit for CVE-2022-30136
☆15Jul 11, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2022-30136
Users that are interested in CVE-2022-30136 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tips and tricks on reversing and exploiting Windows using free and easy to get tools.☆33Mar 21, 2023Updated 3 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- ☆17Dec 3, 2023Updated 2 years ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆27Mar 17, 2024Updated 2 years ago
- LDAP library for auditing MS AD☆13Nov 28, 2023Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Dec 24, 2019Updated 6 years ago
- Windows LPE exploit for CVE-2022-37969☆135Jul 11, 2023Updated 2 years ago
- ☆26Jan 10, 2019Updated 7 years ago
- Simple reverse shell to avoid Windows defender and kaspersky detection☆21Dec 20, 2021Updated 4 years ago
- WebSocket 内存马/Webshell,一种新型内存马/WebShell技术☆22Apr 10, 2023Updated 2 years ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Aug 6, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Jan 20, 2020Updated 6 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆34Aug 16, 2023Updated 2 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- 🦫 Hop server side SDK for Go☆12May 30, 2023Updated 2 years ago
- Travis builds for certbot.eff.org☆12Jan 19, 2022Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Checklists☆16Sep 22, 2016Updated 9 years ago
- PoC BSOD for CVE-2020-16898 (badneighbor)☆21Oct 16, 2020Updated 5 years ago
- My dotfiles for Windows boxes☆29Feb 22, 2026Updated last month
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- A template repo used by Autonomous Systems and Robotics Group for ML projects☆16Mar 8, 2023Updated 3 years ago
- ☆11Feb 13, 2024Updated 2 years ago
- EA-HAS-Bench: Energy-Aware Hyperparameter and Architecture Search Benchmark (ICLR Spotlight 2023)☆18Dec 8, 2024Updated last year
- Yet another Windows DLL injector.☆40Nov 17, 2021Updated 4 years ago
- A list of transforms for searching Red, Yellow, and UNSC notices by Name or Phrase.☆25Jun 15, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆14Mar 16, 2022Updated 4 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- 🐰 Rust client library for the Leap Edge socket service☆12Oct 8, 2023Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆33Mar 2, 2021Updated 5 years ago
- PoC for the ThemeBleed Windows 11 CVE-2023-38146 written in python using impacket. https://jnns.de/posts/cve-2023-38146-poc/☆25May 1, 2024Updated last year
- My Python Cookiecutter project template☆32Sep 6, 2022Updated 3 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago