Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071
☆20Nov 5, 2025Updated 4 months ago
Alternatives and similar repositories for CVE-2025-24054_CVE-2025-24071-PoC
Users that are interested in CVE-2025-24054_CVE-2025-24071-PoC are comparing it to the libraries listed below
Sorting:
- WordPress File Upload RCE Exploit☆17Sep 1, 2025Updated 6 months ago
- This lab seeks to put the pieces of information learned in my CCNP journey together and come up with a working topology☆11Jan 12, 2026Updated last month
- ☆14May 26, 2024Updated last year
- A repo for output of an intrusion prediction project☆11Feb 28, 2026Updated last week
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- 内核级Dll注入监控,利用ETW输出和溯源☆11Dec 8, 2024Updated last year
- Environment setup and automation fun with the Nexus9000v☆10Feb 15, 2019Updated 7 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- 反弹shell管理工具☆11Feb 10, 2020Updated 6 years ago
- I want to say please and thank you to Claude, but I don't want to waste tokens on it.☆27Feb 18, 2026Updated 2 weeks ago
- ☆18Jan 26, 2026Updated last month
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated last month
- Whether you're a seasoned expert or a beginner, Kali GPT helps streamline your workflow, making penetration testing more efficient and ac…☆20Feb 9, 2026Updated last month
- Simple Linux Kernel Module rootkit for 5.x/6.x x86/64 only☆13Apr 21, 2025Updated 10 months ago
- PoC for CVE-2025-32463 - Sudo chroot Elevation of Privilege Vulnerability☆23Jul 5, 2025Updated 8 months ago
- ☆13May 21, 2025Updated 9 months ago
- ☆13Aug 26, 2024Updated last year
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆31Jan 11, 2026Updated last month
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Kali Linux Cheat Sheet☆14Jan 23, 2023Updated 3 years ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated last month
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- CVE-2023-20198 PoC (!)☆11Oct 17, 2023Updated 2 years ago
- Deception implementation through analysis of BloodHound data☆53Oct 9, 2025Updated 5 months ago
- TeaVin - Ultimate ESP32 EvilTwin☆13Mar 25, 2024Updated last year
- ☆16May 29, 2024Updated last year
- ☆12Jun 6, 2025Updated 9 months ago
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 4 months ago
- CVE-2023-20198 Exploit PoC☆63Dec 7, 2023Updated 2 years ago
- ☆15Jun 3, 2018Updated 7 years ago
- Demo repository for running eBPF in GitHub Actions☆23Mar 27, 2025Updated 11 months ago
- The vulnerability allows an attacker with network access to an Erlang/OTP SSH server to execute arbitrary code without prior authenticati…☆15Aug 4, 2025Updated 7 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- Decrypt SCCM and DPAPI secrets with Powershell.☆45Jun 24, 2025Updated 8 months ago
- Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604)☆17Aug 2, 2024Updated last year
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆57Jan 27, 2026Updated last month
- PC免杀远控winos4.0成品☆33Mar 26, 2025Updated 11 months ago
- Rainbow table generation & lookup tools.☆32Dec 17, 2025Updated 2 months ago