helidem / CVE-2025-24054_CVE-2025-24071-PoCView external linksLinks
Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071
☆21Nov 5, 2025Updated 3 months ago
Alternatives and similar repositories for CVE-2025-24054_CVE-2025-24071-PoC
Users that are interested in CVE-2025-24054_CVE-2025-24071-PoC are comparing it to the libraries listed below
Sorting:
- WordPress File Upload RCE Exploit☆17Sep 1, 2025Updated 5 months ago
- This lab seeks to put the pieces of information learned in my CCNP journey together and come up with a working topology☆11Jan 12, 2026Updated last month
- A repo for output of an intrusion prediction project☆11Feb 8, 2026Updated last week
- ☆14May 26, 2024Updated last year
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 6 months ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated 3 weeks ago
- Opengraph-Compatible JSON Generator for BloodHound☆26Jan 12, 2026Updated last month
- ☆18Aug 15, 2025Updated 6 months ago
- ☆18Jan 26, 2026Updated 3 weeks ago
- Simple Linux Kernel Module rootkit for 5.x/6.x x86/64 only☆13Apr 21, 2025Updated 9 months ago
- Environment setup and automation fun with the Nexus9000v☆10Feb 15, 2019Updated 7 years ago
- PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability☆23Jul 5, 2025Updated 7 months ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- ☆12May 21, 2025Updated 8 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆30Jan 11, 2026Updated last month
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 7 months ago
- CVE-2023-20198 Exploit PoC☆63Dec 7, 2023Updated 2 years ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 3 months ago
- ☆16May 29, 2024Updated last year
- CVE-2023-20198 PoC (!)☆11Oct 17, 2023Updated 2 years ago
- ☆12Jun 6, 2025Updated 8 months ago
- The vulnerability allows an attacker with network access to an Erlang/OTP SSH server to execute arbitrary code without prior authenticati…☆15Aug 4, 2025Updated 6 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 2 months ago
- Decrypt SCCM and DPAPI secrets with Powershell.☆45Jun 24, 2025Updated 7 months ago
- Rainbow table generation & lookup tools.☆30Dec 17, 2025Updated 2 months ago
- Demo repository for running eBPF in GitHub Actions☆23Mar 27, 2025Updated 10 months ago
- ☆18Feb 29, 2024Updated last year
- ☆21Nov 19, 2025Updated 2 months ago
- ☆41Dec 24, 2025Updated last month
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- Free o365.yaml and updated version of evilginx with all bypass methods included.☆23Nov 27, 2024Updated last year
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Python, Rust and Crystal☆52Jan 27, 2026Updated 3 weeks ago
- This is an advanced ASMI bypass that is currently undetected by Windows Defender and all the Antivirus software's on virustotal.☆25Jun 10, 2025Updated 8 months ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 6 months ago
- Burp Suite/antsword - Interactive shell (HTTP hijack + POST + AES-256-CBC/BASE64)☆28Dec 8, 2025Updated 2 months ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 3 weeks ago