WSUS Unauthenticated RCE
☆169Oct 28, 2025Updated 4 months ago
Alternatives and similar repositories for CVE-2025-59287
Users that are interested in CVE-2025-59287 are comparing it to the libraries listed below
Sorting:
- Calling the undocumented DPAPI RPC interface directly, no more calling public CryptUnprotectData!☆75Feb 4, 2026Updated last month
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- Integer overflow in FreeType software, which also affects Chrome☆28Aug 27, 2025Updated 6 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆199Dec 30, 2025Updated 2 months ago
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 7 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆71Dec 26, 2025Updated 2 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆164Nov 2, 2025Updated 4 months ago
- ☆24May 14, 2025Updated 9 months ago
- Some V8 n-day exploits that I've written☆50Mar 1, 2026Updated last week
- Automated DLL Hijacking Detection Tool with Zero False Positives — Discovers, filters, and canary-confirms exploitable DLL hijacks on Win…☆135Updated this week
- Commandline spoofing on Windows☆94Nov 25, 2025Updated 3 months ago
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆286Feb 2, 2026Updated last month
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated last month
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆37Feb 6, 2026Updated last month
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- Updated o365 Evilginx phishlet for WHfB☆90Mar 16, 2024Updated last year
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆102Jan 26, 2026Updated last month
- Document intricacies of using WinDBG to aid Rust project development☆17Nov 19, 2024Updated last year
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- BYOVD: Use 360 WFP driver to block EDR/XDR network connection.☆103Feb 10, 2026Updated 3 weeks ago
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated last month
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 7 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆65Jan 13, 2026Updated last month
- ADCS cert template modification and ACL enumeration☆143Jun 26, 2023Updated 2 years ago
- ☆14Aug 22, 2025Updated 6 months ago
- ☆12Nov 25, 2024Updated last year
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 8 months ago
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆25Jan 17, 2026Updated last month
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- Abusing SSRF to deliver an authenticated command injection payload☆29Sep 1, 2025Updated 6 months ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆75Nov 10, 2025Updated 3 months ago
- A lightweight Windows Prefetch file parser to extract programs' execution history☆67Jan 12, 2026Updated last month
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- 二进制学习笔记☆12Oct 14, 2020Updated 5 years ago