kh4sh3i / CVE-2025-32463View external linksLinks
Local Privilege Escalation to Root via Sudo chroot in Linux
☆451Jul 2, 2025Updated 7 months ago
Alternatives and similar repositories for CVE-2025-32463
Users that are interested in CVE-2025-32463 are comparing it to the libraries listed below
Sorting:
- PoC Exploit for the NTLM reflection SMB flaw.☆674Feb 9, 2026Updated last week
- LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113☆514Jan 2, 2025Updated last year
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆69May 31, 2025Updated 8 months ago
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- Deserialization payload generator for a variety of .NET formatters☆176Dec 2, 2025Updated 2 months ago
- Proof of Concept for CVE-2025-31161 / CVE-2025-2825☆49Apr 8, 2025Updated 10 months ago
- POC exploit for CVE-2024-49138☆266Feb 14, 2025Updated last year
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆395Mar 20, 2025Updated 10 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 5 months ago
- ☆262Jul 8, 2025Updated 7 months ago
- a tool used to analyze and monitor in named pipes☆193Oct 27, 2024Updated last year
- metasploit module for the CVE-2025-24071☆26Mar 18, 2025Updated 10 months ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 6 years ago
- Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463☆514Nov 19, 2025Updated 2 months ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆184Mar 14, 2025Updated 11 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- PoC☆104Updated this week
- ☆2,182Nov 24, 2023Updated 2 years ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 5 months ago
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆44Nov 19, 2025Updated 2 months ago
- ☆24May 14, 2025Updated 9 months ago
- C# Data Collector for BloodHound☆1,188Jan 16, 2026Updated last month
- RCE through a race condition in Apache Tomcat☆56Dec 21, 2024Updated last year
- This is the tool to dump the LSASS process on modern Windows 11☆555Nov 1, 2025Updated 3 months ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,697Feb 8, 2026Updated last week
- Lab used for workshop and CTF☆491Feb 3, 2026Updated last week
- C2 infrastructure over Microsoft Teams.☆737Jan 15, 2025Updated last year
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆166Mar 30, 2025Updated 10 months ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆110Feb 2, 2026Updated 2 weeks ago
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆306Jun 22, 2024Updated last year
- Active Directory data ingestor for BloodHound Community Edition written in Rust. 🦀☆447Jan 15, 2026Updated last month
- CVE-2025-30208-EXP☆199Apr 1, 2025Updated 10 months ago
- Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, in…☆2,432Apr 17, 2024Updated last year
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆167Jun 29, 2025Updated 7 months ago
- EDR-Redir : a tool used to redirect the EDR's folder to another location.☆222Nov 6, 2025Updated 3 months ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆159Jun 13, 2025Updated 8 months ago
- Activation Context Hijack☆169Aug 3, 2025Updated 6 months ago