Quick test for CVE-2023-26025 behaviours
☆13Nov 29, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-36025
Users that are interested in CVE-2023-36025 are comparing it to the libraries listed below
Sorting:
- Inject scripts into gzipped pages without decompression☆14Feb 4, 2026Updated last month
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- ☆19May 1, 2025Updated 10 months ago
- EmbedExeLnk by x86matthew modified by d4rkiZ☆44Apr 27, 2023Updated 2 years ago
- Vovk is framework of tools that include a WinDbg extension that generates in-depth YARA rules for malware.☆24Aug 26, 2024Updated last year
- Simple PoC causing overflow☆19Oct 11, 2023Updated 2 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 9 months ago
- ☆18Dec 12, 2020Updated 5 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 3 months ago
- Tool to obtain hash using MS-SNTP for user accounts☆29Jan 22, 2025Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 7 months ago
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 10 months ago
- CVE-2023-40477 PoC by Wild-Pointer☆24Aug 30, 2023Updated 2 years ago
- ESF modular ingestion tool for development and research.☆38Dec 21, 2021Updated 4 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆27Aug 20, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Permanently disable EDRs as local admin☆127Dec 19, 2025Updated 2 months ago
- Crack passwords with Hashcat using a Discord Bot.☆28Oct 30, 2023Updated 2 years ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆30Apr 17, 2024Updated last year
- WinRAR 0day CVE-2025-8088 PoC RAR Archive☆45Aug 12, 2025Updated 6 months ago
- Shellcode_IA32 is a dataset consisting of challenging but common assembly instructions, collected from real shellcodes, with their natura…☆38Jul 19, 2023Updated 2 years ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 3 months ago
- ☆79Aug 5, 2024Updated last year
- AADInternals-Endpoints PowerShell module☆35Jul 2, 2025Updated 8 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Jul 29, 2025Updated 7 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆290May 27, 2024Updated last year
- Cross-platform SOCKS5 proxy server program/library written in C that can also reverse itself over a firewall.☆31Aug 8, 2022Updated 3 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Jan 23, 2020Updated 6 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 8 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Aug 15, 2024Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Jan 12, 2023Updated 3 years ago
- ☆84May 19, 2024Updated last year