WSUS Unauthenticated RCE
☆170Oct 28, 2025Updated 5 months ago
Alternatives and similar repositories for CVE-2025-59287
Users that are interested in CVE-2025-59287 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- Integer overflow in FreeType software, which also affects Chrome☆29Aug 27, 2025Updated 7 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆166Nov 2, 2025Updated 4 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆201Dec 30, 2025Updated 2 months ago
- Commandline spoofing on Windows☆95Nov 25, 2025Updated 4 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆72Dec 26, 2025Updated 3 months ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆26Updated this week
- ☆27May 14, 2025Updated 10 months ago
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 7 months ago
- Check robustness of your (their) Active Directory accounts passwords☆45Mar 13, 2026Updated 2 weeks ago
- Arsenal of modules to beacon postex☆98Mar 13, 2026Updated 2 weeks ago
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆297Feb 2, 2026Updated last month
- Overview of MS Defender☆118Feb 20, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Cobalt Strike Aggressor Script for identifying security products on Windows hosts — six enumeration methods rated by noise level, from si…☆44Feb 6, 2026Updated last month
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated 2 months ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆80Mar 13, 2026Updated 2 weeks ago
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆231Nov 6, 2025Updated 4 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- A stager and implant that executes remote Web Assembly☆63Feb 4, 2026Updated last month
- BYOVD: Use 360 WFP driver to block EDR/XDR network connection.☆105Feb 10, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A lightweight Windows Prefetch file parser to extract programs' execution history☆68Jan 12, 2026Updated 2 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆16Mar 9, 2026Updated 3 weeks ago
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 3 months ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- A Windows kernel driver viewer and manager built in Rust — real-time enumeration, signature verification, SCM operations, and multi-for…☆115Mar 16, 2026Updated 2 weeks ago
- A PICO for Crystal Palace that implements CLR hosting to execute a .NET assembly in memory.☆129Jan 28, 2026Updated 2 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Some V8 n-day exploits that I've written☆53Mar 1, 2026Updated 3 weeks ago
- Document intricacies of using WinDBG to aid Rust project development☆17Nov 19, 2024Updated last year
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆231Mar 13, 2026Updated 2 weeks ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆39Aug 5, 2025Updated 7 months ago
- Burp Suite/antsword - Interactive shell (HTTP hijack + POST + AES-256-CBC/BASE64)☆29Dec 8, 2025Updated 3 months ago
- 简单go加载器实现免杀360 火绒☆38Oct 11, 2021Updated 4 years ago
- Virtual Trust Level (VTL 1) secure call tracing☆103Feb 12, 2026Updated last month